Movatterモバイル変換


[0]ホーム

URL:


CN109559123B - Hybrid point-to-point network processing method - Google Patents

Hybrid point-to-point network processing method
Download PDF

Info

Publication number
CN109559123B
CN109559123BCN201811502912.3ACN201811502912ACN109559123BCN 109559123 BCN109559123 BCN 109559123BCN 201811502912 ACN201811502912 ACN 201811502912ACN 109559123 BCN109559123 BCN 109559123B
Authority
CN
China
Prior art keywords
verification
client
service node
nodes
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811502912.3A
Other languages
Chinese (zh)
Other versions
CN109559123A (en
Inventor
万民
黄伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xiaolvren Network Information Technology Co ltd
Original Assignee
Shenzhen Xiaolvren Network Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xiaolvren Network Information Technology Co ltdfiledCriticalShenzhen Xiaolvren Network Information Technology Co ltd
Priority to CN201811502912.3ApriorityCriticalpatent/CN109559123B/en
Publication of CN109559123ApublicationCriticalpatent/CN109559123A/en
Application grantedgrantedCritical
Publication of CN109559123BpublicationCriticalpatent/CN109559123B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The embodiment of the application relates to a hybrid point-to-point network processing method, a hybrid point-to-point network processing device, a client, a hybrid point-to-point network and a storage medium. The method comprises the following steps: uploading the interactive data of the client and the service nodes to at least two verification nodes so that the at least two verification nodes verify whether the service nodes are credible or not, and sending verification results to a block chain; and inquiring the verification result in the block chain, and if the verification result is that the service node is credible, authorizing the service node so that the service node can access the authorization data of the client on the block chain. Thus, the trust problem of the centralized network and the security problem of the decentralized network can be solved.

Description

Hybrid point-to-point network processing method
Technical Field
The present invention relates to the field of block chain technology, and in particular, to a peer-to-peer network processing method, apparatus, client, hybrid peer-to-peer network, and storage medium.
Background
With the rise of block chains, research on decentralized networks has also flourished.
In a centralized network, a central platform is needed to solve the trust problem, but the central platform itself becomes one of the incredible factors, the traditional decentralized block-based network consumes too much useless energy due to the decentralized problem and the workload Proof (PoW: Proof of Work) mode, the block generation needs miners to perform countless times of calculation, and the rights and interests Proof (PoS: Proof of stamp) is also centralized in nature, so that the great safety problem exists.
Disclosure of Invention
The technical problem mainly solved by the embodiment of the invention is to provide a point-to-point network processing method, a point-to-point network processing device, a client, a mixed point-to-point network and a storage medium, which can solve the trust problem of a centralized network and the safety problem of a decentralized network in the prior art.
In a first aspect, an embodiment of the present application provides a hybrid peer-to-peer network processing method, which is used for a client, and includes:
uploading the interactive data of the client and the service nodes to at least two verification nodes so that the at least two verification nodes verify whether the service nodes are credible or not, and sending verification results to a block chain;
and inquiring the verification result in the block chain, and if the verification result is that the service node is credible, authorizing the service node so that the service node can access the authorization data of the client on the block chain.
In some embodiments, the method further comprises:
encrypting data and uploading the encrypted data to the block chain;
data is acquired from the blockchain.
In some embodiments, the method further comprises:
and point reward is carried out on the nodes which are the service node and the verification node.
In some embodiments, the at least two verification nodes verifying whether the service node is authentic, comprising:
and the at least two verification nodes verify whether the service node is credible according to PBFT algorithm voting.
In a second aspect, an embodiment of the present application further provides a hybrid peer-to-peer network processing apparatus, which is used for a client, and includes:
the first uploading module is used for uploading the interactive data of the client and the service nodes to at least two verification nodes so that the at least two verification nodes verify whether the service nodes are credible or not and send verification results to the block chain;
and the query module is used for querying the verification result in the block chain, and if the verification result is that the service node is credible, the service node is authorized to the service node so that the service node can access the authorization data of the client on the block chain.
In a third aspect, an embodiment of the present application further provides a client, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method described above.
In a fourth aspect, an embodiment of the present application further provides a hybrid peer-to-peer network, including: the system comprises the client, a service node, a verification node and a block chain, wherein the service node, the verification node and the block chain are respectively in communication connection with the client;
the client is used for carrying out data interaction with the service node;
the service node is used for providing centralized service;
the verification node is used for verifying whether the service node is credible;
the block chain is respectively in communication connection with the client, the service node and the verification node, and provides data for the client and the service node and receives a verification result sent by the verification node.
In a fifth aspect, the present application also provides a non-transitory computer-readable storage medium storing computer-executable instructions, which, when executed by a processor, cause the processor to perform the above-mentioned method.
According to the hybrid point-to-point network processing method provided by the embodiment of the application, the interactive data of the client and the service nodes are sent to at least two verification nodes for reliability verification, the verification result is sent to the block chain, and if the service nodes are credible, the client can authorize the service nodes to access the block chain to obtain data on the block chain by using a digital signature, so that the trust problem of a centralized network and the safety problem of a decentralized network can be solved.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
FIG. 1 is a schematic diagram of a hybrid peer-to-peer network of the present application;
FIG. 2 is a flow diagram of one embodiment of a hybrid peer-to-peer network processing method of the present application;
FIG. 3 is a block diagram illustrating an exemplary hybrid peer-to-peer network processing device;
FIG. 4 is a block diagram illustrating an exemplary hybrid peer-to-peer network processing device;
fig. 5 is a hardware configuration diagram of an embodiment of the client terminal of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The hybrid peer-to-peer network provided by the present application, as shown in fig. 1, includes aclient 10, and aservice node 20, anauthentication node 30, and ablockchain 40, which are respectively connected to theclient 10 in a communication manner. Theclient 10 is connected in communication with theservice node 20, and is used for performing data interaction with theservice node 20 and uploading the interacted data to theverification node 30. Theservice node 20 is connected to theclient 10 in communication, and provides a centralized service for theclient 10.Verification node 30 is communicatively coupled to servingnode 20, andverification node 30 is configured to verify whetherserving node 20 is trusted. Theblockchain 40 is in communication connection with theclient 10 and theservice node 20, respectively, theclient 10 can directly send data to theblockchain 40 in an encrypted manner and obtain data from theblockchain 40, theblockchain 40 is in communication connection with theservice node 20, and when theclient 10 authorizes theservice node 20, theservice node 20 can access theblockchain 40 to obtain data. The number of theservice nodes 20, theverification nodes 30 and theblockchain 40 is plural, anyservice node 20 is connected with anyverification node 30 in a communication way, theblockchain 40 is connected with theservice node 20 in a communication way, fig. 1 only shows an example of the service node a, the verification node B1, the verification node B2, the verification node B3, the verification node B4, the blockchain C1, the blockchain C2 and the blockchain C3, and in an actual network environment, more service nodes, verification nodes and blockchains are further included.
The interactive data of the client and the service nodes are sent to at least two verification nodes for reliability verification, the verification result is sent to the block chain, and if the service nodes are credible, the client can authorize the service nodes to access the block chain to obtain the data by using a digital signature on the block chain, so that the trust problem of a centralized network and the safety problem of a decentralized network can be solved. If the verification node confirms that the service node is not trusted, the service node or the client records the non-trusted information to the block chain, and other clients can select the non-trusted information according to the situation.
As shown in fig. 2, an embodiment of the present application provides a hybrid peer-to-peer network processing method, which is used for a client and includes:
step 202, uploading the interaction data of the client and the service node to at least two verification nodes, so that the at least two verification nodes verify whether the service node is trusted or not, and sending the verification result to the block chain.
Before data interaction is carried out between a client and a service node, the client and the service node are respectively provided with a corresponding application program, when the client and the service node carry out data interaction, the interaction data are uploaded to at least two verification nodes, the verification nodes immediately carry out reliability verification on the service node after receiving the data, and then the verification results are sent to a block chain for the client to inquire. In particular, at least two verification nodes may vote to decide whether a service node is trusted using the PBFT algorithm. For example, when a plurality of verification nodes vote that a service node is not trusted, the verification nodes notify a client that the service node is not trusted, and the client may query whether the service node is trusted by itself.
Andstep 204, inquiring a verification result in the block chain, and if the verification result is that the service node is credible, authorizing the service node so that the service node can access the authorization data of the client on the block chain.
After the verification node sends the verification result to the block chain, the client can inquire the verification result in the block chain, and if the verification result is that the service node is authentic, the client can authorize the service node to access the block chain to obtain data on the block chain by using a digital signature.
The interactive data of the client and the service nodes are sent to at least two verification nodes for reliability verification, the verification result is sent to the block chain, and if the service nodes are credible, the client can authorize the service nodes to access the block chain to obtain the data by using a digital signature on the block chain, so that the trust problem of a centralized network and the safety problem of a decentralized network can be solved.
In one embodiment, the hybrid peer-to-peer network processing method further includes: encrypting the data and uploading the encrypted data to a block chain; data is acquired from a chain of blocks.
Because the client is in communication connection with the blockchain, the data is directly uploaded to the blockchain in a public key encryption mode, the client can directly obtain the data in the blockchain without obtaining the data from a centralized service node, and therefore safety can be guaranteed. It should be noted that the data encryption method is not limited, and only the data is guaranteed not to be tampered, and the limitation in this embodiment is not required.
In one embodiment, the hybrid peer-to-peer network processing method further includes: points are rewarded for nodes that are serving nodes and verification nodes.
The bonus points is only one of many bonus methods, but is not limited to bonus points. In this embodiment, in order to give the reward node as the service node and the verification node, the token or the credit operated by a certain bank enterprise may be given to the service node and the verification node as the reward. In other embodiments, the data of the client may also be granted to the service node, and the manner of the reward is not limited, and is not limited in this embodiment.
Accordingly, an embodiment of the present application further provides a hybrid peer-to-peer network processing apparatus, for a client, as shown in fig. 3, where the hybrid peer-to-peernetwork processing apparatus 300 includes:
the first uploading module 302 is configured to upload the interaction data between the client and the service node to at least two verification nodes, so that the at least two verification nodes verify whether the service node is trusted, and send a verification result to the block chain.
And the query module 304 is configured to query the verification result in the blockchain, and if the verification result is that the service node is trusted, authorize the service node, so that the service node can access the authorization data of the client in the blockchain.
According to the hybrid point-to-point network processing device provided by the embodiment of the application, the interactive data of the client and the service nodes are sent to at least two verification nodes for reliability verification, the verification result is sent to the block chain, and if the service nodes are credible, the client can authorize the service nodes to access the block chain to obtain data on the block chain by using a digital signature, so that the trust problem of a centralized network and the safety problem of a decentralized network can be solved.
Optionally, in another embodiment of the apparatus, referring to fig. 4, theapparatus 300 further includes:
a second uploading module 306, configured to upload the encrypted data to the blockchain, so that the client obtains the data.
Optionally, in another embodiment of the apparatus, referring to fig. 4, theapparatus 300 further includes:
a reward module 308 for rewarding points for nodes that are the service node and the verification node.
Optionally, in another embodiment of the apparatus, referring to fig. 4, theapparatus 300 further includes:
and the verification module 310 is used for voting by at least two verification nodes to verify whether the service node is credible according to the PBFT algorithm.
It should be noted that the hybrid peer-to-peer network processing apparatus can execute the hybrid peer-to-peer network processing method provided in the embodiment of the present application, and has functional modules and beneficial effects corresponding to the execution method. For technical details that are not described in detail in the embodiment of the hybrid peer-to-peer network processing device, reference may be made to the hybrid peer-to-peer network processing method provided in the embodiment of the present application.
Fig. 5 is a schematic hardware structure diagram of theclient 10 according to an embodiment of the present application, and as shown in fig. 5, theclient 10 includes:
one ormore processors 11 and amemory 12, with oneprocessor 11 being an example in fig. 5.
Theprocessor 11 and thememory 12 may be connected by a bus or other means, and fig. 5 illustrates the connection by a bus as an example.
Thememory 12, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules (e.g., the first upload module 302 and the query module 304 shown in fig. 3) corresponding to the hybrid peer-to-peer network processing method in the embodiment of the present application. Theprocessor 11 executes various functional applications and data processing of the client by executing the nonvolatile software program, instructions and modules stored in thememory 12, that is, the hybrid point-to-point network processing method of the foregoing method embodiment is implemented.
Thememory 12 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the hybrid point-to-point network processing device, and the like. Further, thememory 12 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments,memory 12 may optionally include memory located remotely fromprocessor 11, which may be connected to a hybrid point-to-point network processing device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules are stored in thememory 12, and when executed by the one ormore processors 11, perform the hybrid peer-to-peer network processing method in any of the above method embodiments, for example, perform the above-described method steps 202 to 204 in fig. 2; the functions of the modules 302 to 304 in fig. 3 and the modules 302 to 310 in fig. 4 are realized.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the methods provided in the embodiments of the present application.
Embodiments of the present application provide a non-transitory computer-readable storage medium storing computer-executable instructions, which are executed by one or more processors, such as oneprocessor 11 in fig. 5, to enable the one or more processors to perform the hybrid peer-to-peer network processing method in any of the above method embodiments, such as performing the above-described method steps 202 to 204 in fig. 2; the functions of the modules 302 to 304 in fig. 3 and the modules 302 to 310 in fig. 4 are realized.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; within the context of the present application, where technical features in the above embodiments or in different embodiments can also be combined, the steps can be implemented in any order and there are many other variations of the different aspects of the present application as described above, which are not provided in detail for the sake of brevity; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

CN201811502912.3A2018-12-102018-12-10Hybrid point-to-point network processing methodActiveCN109559123B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811502912.3ACN109559123B (en)2018-12-102018-12-10Hybrid point-to-point network processing method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811502912.3ACN109559123B (en)2018-12-102018-12-10Hybrid point-to-point network processing method

Publications (2)

Publication NumberPublication Date
CN109559123A CN109559123A (en)2019-04-02
CN109559123Btrue CN109559123B (en)2021-10-29

Family

ID=65869413

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811502912.3AActiveCN109559123B (en)2018-12-102018-12-10Hybrid point-to-point network processing method

Country Status (1)

CountryLink
CN (1)CN109559123B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112528321A (en)*2020-12-092021-03-19苏州市星际云通区块链科技有限公司Block chain service device, block chain service system and communication method

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106296359A (en)*2016-08-132017-01-04深圳市樊溪电子有限公司Credible electric power networks transaction platform based on block chain technology
CN106911641A (en)*2015-12-232017-06-30索尼公司For authorizing the client terminal device for accessing, server unit and access control system
CN107079036A (en)*2016-12-232017-08-18深圳前海达闼云端智能科技有限公司 Registration and authorization method, device and system
CN108270551A (en)*2018-02-022018-07-10上海二秒科技有限公司A kind of safety service structure system on block chain

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105681301B (en)*2016-01-162019-03-12杭州复杂美科技有限公司Settlement method on block chain
CN106060036B (en)*2016-05-262019-07-16布比(北京)网络技术有限公司Decentralization common recognition method and device
US20180285839A1 (en)*2017-04-042018-10-04Datient, Inc.Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network
CN107241360B (en)*2017-08-042019-01-18北京明朝万达科技股份有限公司A kind of data safety shares exchange method and data safety shares switching plane system
CN108270780B (en)*2018-01-082020-12-29中国电子科技集团公司第三十研究所 A multi-center digital identity management method for heterogeneous network environment
CN108390891A (en)*2018-03-282018-08-10电子科技大学天府协同创新中心 Information protection method based on private blockchain
CN108712431B (en)*2018-05-242021-09-21广东工业大学 A method and device for storing traffic information based on consortium chain
CN108881428B (en)*2018-06-132020-11-24明阳智慧能源集团股份公司 A blockchain system with a regulatory mechanism
CN108830602B (en)*2018-06-272022-03-29电子科技大学Permission chain construction and management and control method based on chameleon hash function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106911641A (en)*2015-12-232017-06-30索尼公司For authorizing the client terminal device for accessing, server unit and access control system
CN106296359A (en)*2016-08-132017-01-04深圳市樊溪电子有限公司Credible electric power networks transaction platform based on block chain technology
CN107079036A (en)*2016-12-232017-08-18深圳前海达闼云端智能科技有限公司 Registration and authorization method, device and system
CN108270551A (en)*2018-02-022018-07-10上海二秒科技有限公司A kind of safety service structure system on block chain

Also Published As

Publication numberPublication date
CN109559123A (en)2019-04-02

Similar Documents

PublicationPublication DateTitle
CN111935094B (en)Database access method, device, system and computer readable storage medium
CN112214780B (en)Data processing method and device, intelligent equipment and storage medium
CN108646983B (en)Processing method and device for storing service data on block chain
JP6907679B2 (en) Cryptocurrency-based event participation verification
CN110177124B (en)Identity authentication method based on block chain and related equipment
CN112527912B (en)Data processing method and device based on block chain network and computer equipment
CN104980477A (en)Data access control method and system in cloud storage environment
CN109274652A (en)Identity information verifies system, method and device and computer storage medium
Mukhandi et al.Blockchain-based device identity management with consensus authentication for IoT devices
CN111314066B (en)Block chain-based data transfer method, terminal and computer-readable storage medium
CN113256297A (en)Data processing method, device and equipment based on block chain and readable storage medium
CN112862487A (en)Digital certificate authentication method, equipment and storage medium
CN111460400A (en)Data processing method and device and computer readable storage medium
CN110910110A (en) A data processing method, device and computer storage medium
US20190044721A1 (en)Device authorization using symmetric key systems and methods
CN110661779A (en)Block chain network-based electronic certificate management method, system, device and medium
CN115622812A (en)Digital identity verification method and system based on block chain intelligent contract
CN108846671B (en)Online secure transaction method and system based on block chain
CN109559123B (en)Hybrid point-to-point network processing method
CN113872986B (en)Power distribution terminal authentication method and device and computer equipment
CN113868713A (en)Data verification method and device, electronic equipment and storage medium
CN116561820B (en)Trusted data processing method and related device
CN117595996A (en)Electronic signature processing method and device, electronic equipment and storage medium
CN116881936A (en)Trusted computing method and related equipment
CN116339772A (en)Software management method, system and device

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
TA01Transfer of patent application right

Effective date of registration:20200414

Address after:518000 501, No. 12, Huancheng South Road, Ma'antang community, Bantian street, Longgang District, Shenzhen City, Guangdong province (i.e., Huazhong Science Park 501-2)

Applicant after:Jicang Technology (Shenzhen) Co., Ltd

Address before:518000 Third Floor, Jiuxin Business Center, Meilong Road, Minzhi Street, Longhua District, Shenzhen City, Guangdong Province

Applicant before:DAKE DATA (SHENZHEN) Co.,Ltd.

TA01Transfer of patent application right
TA01Transfer of patent application right

Effective date of registration:20211014

Address after:518000 room 605, building 4, Zhangkeng excellent cultural and creative park, Zhangkeng community, Minzhi street, Longhua District, Shenzhen City, Guangdong Province

Applicant after:Shenzhen xiaolvren Network Information Technology Co.,Ltd.

Address before:518000 501, No. 12, Huancheng South Road, Ma'antang community, Bantian street, Longgang District, Shenzhen, Guangdong (i.e. 501-2, Huazhong Science and Technology Park)

Applicant before:Jicang Technology (Shenzhen) Co.,Ltd.

TA01Transfer of patent application right
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp