CN109067905A - A kind of implementation method of the network application of decentralization - Google Patents

A kind of implementation method of the network application of decentralization Download PDF

Info

Publication number
CN109067905A
CN109067905A CN201811032672.5A CN201811032672A CN109067905A CN 109067905 A CN109067905 A CN 109067905A CN 201811032672 A CN201811032672 A CN 201811032672A CN 109067905 A CN109067905 A CN 109067905A
Authority
CN
China
Prior art keywords
node
application
data
community
application node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811032672.5A
Other languages
Chinese (zh)
Other versions
CN109067905B (en
Inventor
黄秋琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Gongshi Technology Co.,Ltd.
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811032672.5A priority Critical patent/CN109067905B/en
Publication of CN109067905A publication Critical patent/CN109067905A/en
Application granted granted Critical
Publication of CN109067905B publication Critical patent/CN109067905B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • H04L67/1048Departure or maintenance mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1059Inter-group management mechanisms, e.g. splitting, merging or interconnection of groups

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of implementation methods of the network application of decentralization, belong to Internet technical field.It includes at least two application nodes, and two-way connection between the application node, the application node includes client and server-side, and the client receives user's input and feedback output, and the server-side receives client input, and returns and export to client;The application node further includes node data, and each application node stores corresponding node data;At least one described application node constitutes community.The implementation method of the network application of decentralization of the invention avoids losing by the purpose of the network application of the application node realization decentralization of two-way connection so as to effective protection data information security.

Description

A kind of implementation method of the network application of decentralization
Technical field
The present invention relates to a kind of implementation methods of the network application of decentralization, belong to Internet technical field.
Background technique
With the development of internet, mobile Internet and cloud computing technology, Internet company passes through building centralization Network application is becoming the trend constantly reinforced to service hundreds of millions users.Enterprises and individuals are obtained using these systems While convenient and benefit, they are also kidnapped by system, and indulging in various functions can not extricate oneself.In this process mutually Networking enterprise obtains a large amount of human data, and the giant to grow up becomes the king of digital world.
It is more next by developing technologies, the influences and control ability of the Internet enterprises to other people such as artificial intelligence, big data It is stronger, manipulate values the problems such as make observer more and more uneasy.On the other hand, the careless omission of system safety leads to emergence Event is plagiarized and peddled to Internet company's leaking data, brings the precisely serious problems such as swindle to society;Hacker breaks through this without restraint The protection of a little network applications leads to large-scale service disruption, brings massive losses and inconvenience to user.Problem above causes The public introspects and worries to the system of centralization.
Summary of the invention
The purpose of the present invention is for deficiency in the prior art, provide a kind of network application centralization from single The mode of enterprise's control is transformed into the implementation method of the network application of the decentralization of the mode of participant's co- controlling, to solve The drawbacks of information security of the network of centralization.
The object of the present invention is achieved like this:
For achieving the above object, following technical side can be used in the implementation method of the network application of decentralization of the invention Case:
A kind of implementation method of the network application of decentralization of the present invention, including at least two application nodes, the application node Between two-way connection.
Further, the application node includes client and server-side, and the server-side receives client input, And return and export to client, the client receives user's input and feedback output.Because each application node includes visitor Family end and server-side can not then borrow other servers, and facilitate the two-way connection realized between application node.
Further, the application node further includes node data, and each application node, which stores, to be corresponding to it Node data.Each application node stores corresponding node data so as to effective protection data safety.
Further, two-way connection being established between the application node can form through a variety of ways, comprising: one The application node establishes connection or logical by showing the two-dimensional barcode information containing IP address, the face-to-face barcode scanning of other application node It crosses forwarding two dimensional code and realizes indirect association;Or
One application node broadcast message in network establishes connection by matching broadcast message and the application node;Or Person
Token is sent to other application node by social software by one application node, and other application node passes through importing Token establishes connection;Or
One application node is contacted by the website concentrated with the foundation of other application node, the website auxiliary of the concentration Connection for establishing between the application node and/or the functional characteristic for distributing its server-side.
Further, the node data includes from master data and proxy data, and described apply from master data for this is saved User data point creation and modified;The proxy data is that other application node entrusts the application node to store and/or manage The user data of reason.Node data is classified, so as to being managed to node data for more convenient safety.
Further, at least one described application node constitutes community, the section between application node in same community Point data can access mutually, and the node data between the application node of different communities is forbidden accessing.Facilitate correspondence using community It is managed with the node data of node, so as to the more convenient management for securely achieving node data.
Further, at least one described application node constitutes community, the generation between application node in same community Reason data can access mutually, and the node data between the application node of different communities is forbidden accessing.
The node data of application node is managed using the classification of node data and community are convenient, so as to more square Just the management of node data is securely achieved.
Further, at least one described application node constitutes community, the method for building up of the community, including following step It is rapid:
It is requested Step 1: an application node establishes community to the initiation of other application node;
Step 2: other application node confirms, then community establishes.
Using this community's method for building up, the management of realization community that can be safer, so as to be more convenient the reality of safety The management of existing node data.
Further, at least one described application node constitutes community, and the node data of the application node is according to it Affiliated community is grouped.Classified using node data of the community to application node, so as to more fine reality Referring now to the management of node data.
Further, the application node controls the node of other application node visit by being added or exiting community The range of data.Application node controls the range of the node data of other application node visit by being added or exiting community, The limitation of the access profile of node data can be simply implemented.
Further, at least one described application node constitutes community, when node users exit community, the application section The autonomous data failure that point possesses, should be from the corresponding proxy data of master data in other application node failure.After exiting community, lead to Cross the safety management that node data is realized from the failure of master data and proxy data.
Beneficial effect
The implementation method of the network application of decentralization of the invention realizes decentralization by the application node of two-way connection, leads to It crosses application node to be added or exit community to control the range of the node data of other application node visit, can simply implement The limitation of the access profile of node data realize participant can with the size and topology of active management social networks in network The upper data information for controlling oneself avoids losing so as to the safety of effective protection data information.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of the embodiment 1 of the implementation method of the network application of decentralization of the present invention;
Fig. 2 is a kind of structural representation of the application node of the embodiment 2 of the implementation method of the network application of decentralization of the present invention Figure;
Fig. 3 is a kind of schematic diagram of the point-to-point connection of the embodiment 2 of the implementation method of the network application of decentralization of the present invention;
Fig. 4 is a kind of schematic diagram that the community of the embodiment 4 of the implementation method of the network application of decentralization establishes of the present invention;
Fig. 5 is a kind of schematic diagram that the network of the embodiment 7 of the implementation method of the network application of decentralization is closed of the present invention.
Specific embodiment
In the following with reference to the drawings and specific embodiments, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate It the present invention rather than limits the scope of the invention, after the present invention has been read, those skilled in the art are to of the invention each The modification of kind equivalent form falls within the application range as defined in the appended claims.
A kind of implementation method of the network application of decentralization of the present invention, including at least two application nodes, application node Between two-way connection.
Preferably, application node includes client and server-side, and server-side receives client input, and returns to client It feeds back out, client receives user's input and feedback output.Because each application node includes client and server-side, then may be used Not borrow other servers, and facilitate the two-way connection realized between application node.
Preferably, the application node further includes node data, and each application node stores corresponding section Point data.Each application node stores corresponding node data so as to effective protection data safety.
Preferably, it establishes two-way connection between the application node to be formed through a variety of ways, comprising: an application Node establishes connection or by forwarding two by showing the two-dimensional barcode information containing IP address, the face-to-face barcode scanning of other application node It ties up code and realizes indirect association;Or
One application node broadcast message in network establishes connection by matching broadcast message and the application node;Or Person
Token is sent to other application node by social software by one application node, and other application node passes through importing Token establishes connection;Or
One application node is contacted by the website concentrated with the foundation of other application node, and the website of the concentration assists using In the connection established between the application node and/or the functional characteristic for distributing its server-side.
Preferably, node data includes from master data and proxy data, is that the application node is created and modified from master data The user data crossed;Proxy data is the user data that other application node entrusts the application node to store and/or manage.It will section Point data is classified, so as to being managed to node data for more convenient safety.
Preferably, at least one application node constitutes community, and the node data between application node in same community can To access mutually, the node data between the application node of different communities is forbidden accessing.It is convenient to application node using community Node data is managed, so as to the more convenient management for securely achieving node data.
Preferably, at least one application node constitutes community, and the proxy data between application node in same community can To access mutually, the node data between the application node of different communities is forbidden accessing.
The node data of application node is managed using the classification of node data and community are convenient, so as to more square Just the management of node data is securely achieved.
Preferably, at least one application node constitutes community, the method for building up of community, comprising the following steps:
It is requested Step 1: an application node establishes community to the initiation of other application node;
Step 2: other application node confirms, then community establishes.
Using this community's method for building up, the management of realization community that can be safer, so as to be more convenient the reality of safety The management of existing node data.
Preferably, at least one application node constitute community, community of the node data of application node according to belonging to it into Row grouping.Classified using node data of the community to application node, so as to more fine realization for number of nodes According to management.
Preferably, application node controls the model of the node data of other application node visit by being added or exiting community It encloses.Application node controls the range of the node data of other application node visit by being added or exiting community, can be simple Realize the limitation of the access profile of node data in ground.
Preferably, at least one application node constitutes community, when node users exit community, what which possessed Autonomous data failure, should be from the corresponding proxy data of master data in other application node failure.After exiting community, by independently counting The safety management of node data is realized according to the failure with proxy data.
Embodiment 1:
The present invention provides a kind of implementation method of the network application of decentralization, is made of at least two application nodes, such as Fig. 1 institute Show.
Above-mentioned application node is made of node system and node users.One node users possesses one or more node systems System.Node system is interconnected by wide area network, constitutes grid.Node users inquire other nodes by grid User simultaneously establishes two-way connection, constitutes social networks.Social networks includes one or more communities.Each community include one or Multiple node users include other communities.Community passes through application node initiation, other application node by a node users The mode of confirmation is established.Other communities are added by responsible person in community.It is responsible for other nodes in artificial community promoter or community User.
Above-mentioned node system is made of networked devices, client, server-side and node data.As shown in Figure 1, wherein client End, server-side and node data are all mounted on networked devices, and client and server-side collectively form node application.Networked devices For but be not limited only to hand-held intelligent equipment, home smart device etc..Client is interacted with node users, and reception user input is simultaneously anti- Feedback output;Server-side receives client input, and running node data complete function calculating, returns and exports to client.Number of nodes According to the user data for storage on this node.These data are divided into different groupings by type.The packet attributes of data are being created The community where user determines during building.
Above-mentioned node data is divided into from master data and proxy data.It is the use that node users are created and modified from master data User data.Proxy data is the user data that other nodes entrust the node system to store and/or manage.When node system or its In it is unavailable from master data when, proxy data returns to requesting node server-side by certain mechanism.Certain mechanism herein Including but not limited to boundary mechanism.So-called boundary mechanism, specifically, network that network boundary includes by network, interconnected Node is constituted, and participant can dynamically change the size and range of network by being added or exitting network, to guarantee participant's Data are used in known, limited network range always.
Above-mentioned server-side is made of different functional characteristics, and node users can be enabled or be closed these function by client It can characteristic.Server-side can also respond the request of other node serve ends simultaneously to other node serve end requesting node data Return node data;Server-side can carry out the operation such as polymeric filter, operation to the node data that other node serve ends return Result, which returns again to, afterwards gives requesting node server-side.Server-side is only limitted to the request of the node serve end into same community number of responses According to.When node users belong to multiple communities simultaneously, server-side selects corresponding community according to the data grouping of request response.
Above-mentioned server-side to other node serve ends request or response data: node users by be added or exit community come Control the data area that other node users are able to access that.When amount of access is increasing, the networked devices of addition are also got over Come more.When node users exit community, what which possessed ceases to be in force automatically in present node system from master data, It should also cease to be in force automatically from the corresponding proxy data of master data in other node systems.
Above-mentioned server-side is to other node serve end request datas: when the data dependence of request is in a certain specific functional features When processing, server-side is only limitted to the node serve end request data for opening the functional characteristic.
Preferably, when the functional characteristic that server-side accumulation is realized is too many, to avoid transition from consuming the resource of networked devices, Node application and development manufacturer can establish the functional characteristic of the website distribution server end of a concentration, and node users is allowed only to install Partial service end function, embodiment 9 and embodiment 10 will be described in, and details are not described herein again.
The network application of decentralization of the invention realizes decentralization by the application node of two-way connection, so as to Effective protection data information security, avoids data degradation.
Embodiment 2: point-to-point connection is established
As shown in Fig. 2, the network application in the present embodiment is that a mobile phone applies 101, including user interactive module 102, data Processing module 103 and network communication module 104.User interactive module 102 constitutes client-side program, 103 He of data processing module Network communication module 104 constitutes serve end program.
User interactive module 102 includes a main interface and menu, selects menu that can execute " plusing good friend ", " sweep and sweep " Etc. functions.
Assuming that we establish point-to-point connection between two mobile phone applications A and B, as shown in Figure 3.
When user A selects menu item " plusing good friend " to execute function, the user interactive module 102 of mobile phone application A generates one A two dimensional code, wherein can with the IP of the Hash character string (public key) of unique identification mobile phone application A and mobile phone application A comprising one Location.It then include additional third party's outer net IP in two dimensional code when the current IP address of mobile phone application A is internal address Address is used for NAT Durchgangshohle, while the network communication module 104 of mobile phone application A is preparatory and this third party's outer net IP establishes heartbeat Connection.This additional third party's IP address can be some fixing address of application developer announcement, be also possible to work as remote holder The outer net address that machine once cached, or some the outer net address currently connected.
When user B selects menu item " sweep and sweep " to execute function, the user interactive module 102 of mobile phone application B calls hand Machine B camera reads in the two dimensional code that mobile phone applies party A-subscriber's interactive module 102 to generate, the network communication module 104 of mobile phone application B It obtains the IP address of mobile phone application A in two dimensional code and attempts to establish network connection.If the IP address of mobile phone application B is third party Address then takes necessary Durchgangshohle step then to establish network connection.
After successful connection, the data processing module 103 of mobile phone application B passes through 104 handle of mobile phone application B network communication module The Hash character string (public key) and IP address and/or third party's outer net IP address of machine application B issue the data processing of mobile phone application A Module 103.The data processing module 103 of mobile phone application A saves these information and notifies the user interactive module of mobile phone application A 102 increase good friend or update buddy list.Meanwhile the user interactive module 102 of mobile phone application B also increases good friend or updates good friend List.
When mobile phone application A, which establishes second to mobile phone application B, to be connected, the network communication module of mobile phone application A be can read The IP address that the data processing module 103 of mobile phone application A saves simultaneously is attempted to connect, after successful connection mobile phone application A and B respectively The Hash character string (public key) of oneself issues other side and carries out handshake authentication, if mobile phone application A or B discovery other side's application are sent Hash character string (public key) and buddy list save Hash character string (public key) mismatch, then disconnect.
When IP address change occurs for mobile phone A, the network communication module 104 of mobile phone application A is to all hands connected Machine application B sends address change notice, establishes connection to not connected mobile phone application B trial and sends address change notice.It receives Save the IP address of mobile phone A again to the data processing module 103 of the mobile phone application B of notice.It can not connect or not notified User etc. notified again when can connect again.Complicated change relationship may make the newest IP address of mobile phone A again can not be more Newly into certain mobile phone application B data processing modules 103, at this moment mobile phone application B is without the correct company of foundation of normal direction mobile phone application A It connects, needs the newest IP address of first the whole network searching handset application A.
By the above process, each mobile phone can establish connection using 101 with another mobile phone using 101, and save The mode of connection is established, as shown in figure 3, not enumerated one by one herein.
Other than face-to-face " sweep and sweep " mode, mobile phone can also such as be swept by other channels using 101 and take its other party Formula is propagated through next two-dimension code image to obtain the mode for establishing connection with other side.
Embodiment 3: IP address is applied in search
As described in Example 2, the IP address of the possible lost mobile phone application A of mobile phone application B.When mobile phone application B is built to mobile phone application A When vertical connection failure, the network communication module 104 of mobile phone application B can mass-send the Hash character of mobile phone application A to all good friends It goes here and there (public key), while enclosing the IP address and Hash character string (public key) of mobile phone application B.When good friend applies the (mobile phone in such as Fig. 3 Using D) receive mass-sending after voluntarily compare Hash character string (public key), if exact matching if between mobile phone application B establish company It connects and verifies identity again.It is further mass-sended in the buddy list (the mobile phone application C in such as Fig. 3) of oneself if mismatching The searching request of mobile phone application B until mobile phone application B and mobile phone application A establish connection, and saves the mode for establishing connection.
Embodiment 4: community is established
As described in Example 2, menu further includes " creation community " menu item.
When user A selects menu item " creation community " to execute function, the user interactive module 102 of mobile phone application A is shown Buddy list is selected for user A.User A chooses some and after determining, the user interactive module 102 of mobile phone application A generates one It is simultaneously also added to buddy list by new community's (object).The data processing module 103 of same mobile phone application A is raw for new communities Each good friend chosen is issued at a Hash character string (public key) and by network communication module 104 using B, sending " adds Enter community " invitation.
After user B confirmation " community is added " information, confirmation result is returned by the network communication module 104 of mobile phone application B To the user interactive module 102 of mobile phone application A.The data processing module 103 of mobile phone application A updates final community member's list simultaneously Update notification is applied B to each good friend for completing confirmation.The good friend for receiving update notification applies the user interactive module of B 102 refresh the newest list information of community again.
As described above, buddy list in addition to comprising point-to-point user, also includes community.So above-mentioned community creates process Existing community X301 can be equally invited to be added in new communities Y302.As shown in Figure 4.
When inviting community X301 that new communities Y302 is added, in above-mentioned invitation and broadcasting process, the data of mobile phone application A Processing module 103 can identify such case and invitation and broadcast message be issued the group master of community X301.The group master of community X301 It can determine individually to determine into group or solicit user inside the group's opinion.After confirming result, new communities Y302 adds community X301 Enter into members list, while the corresponding all mobile phone applications of members list of community X301 also can be the Hash word of community Y302 Symbol string (public key) and/or IP address are noted on the information of community X301 behind.
It creates as a result, and confirms that the user that community is added keeps all information of community, the Kazakhstan including community and member Uncommon character string (public key).
The data of each user's creation and modification are stored in the networked devices of oneself, and third party is except through addition society Area can not contact these data by other approach.Even if third party has broken through some node and has palmed off actual user come using being System, the data that he can touch also are only limitted to the access right of real user.And personal data be to other users it is sightless, Thus solve the problems, such as individual privacy.
Embodiment 5: creation and management user data
As described in Example 2, user interactive module 102 includes a main interface.When the user clicks and open aobvious when a good friend X Show main interface.We are by taking the main interface of chat feature as an example:
As shown in table 1, when user A main interface issue a new information 401 when, the data processing module 103 of mobile phone application A Message is stored in local and identifies this message and belongs to good friend X402.It is simultaneously point-to-point user or community, mobile phone according to X Message is issued by network communication module 104 by all members in this point-to-point user or community using A.
Table 1:
When returning to the main interface of community X after community member B offline a period of time, 103 meeting of data processing module of mobile phone application B It checks members list and an inquiry request is issued to all members by network communication module 104, this period is left in inquiry Inside belong to the new information of community X.Receive request each community member can respond this request and oneself during this period of time The message of creation returns into mobile phone application B.The user interactive module 102 of mobile phone application B according to respectively return the result reconstruction from Open the conversation content of this period.
When community member (such as user C) can not establish connection, the network communication module 104 of mobile phone application B is to mobile phone This partial data is requested using the mobile phone application C' that acts on behalf of of C.The Hash character string (public key) of agent application C' can be answered with mobile phone It is obtained with the Hash character string (public key) of C and the Hash character string (public key) of community X by algorithm.
When community member B exits community X, all community members can update members list to exclude mobile phone application B, hand Machine application B buddy list does not include community X yet.Then other members belong to the message of community X without normal direction mobile phone application B inquiry, Because X is not in buddy list;Mobile phone application B also belongs to the message of community X without normal direction other membership queries, because B is not in society In area's list.
Embodiment 6: the user data of multi-layer community is used
As described in Example 5, user interactive module 102 includes a main interface.It is shown when opening a good friend X when the user clicks Main interface.We are by taking the main interface of weekly is filled in by enterprise as an example:
Assuming that there are two department A and B, department A three employees such as A1, A2, A3 by enterprise X, department B has three members such as B1, B2, B3 Work, enterprise X are responsible for by employee C.
As described in Example 4, community is established using 101 " plusing good friends " and " sweep and sweep " function, employee A1 by mobile phone G1 contains three good friends such as A1, A2, A3, and employee B1 establishes community G2, contains three good friends such as B1, B2, B3.Employee C Community G0 is established, three good friends such as C, G1, G2 are contained, it is by sweeping the conduct G1 for sweeping employee A and showing that wherein C, which adds G1, The two dimensional code of the main generation of group.
The main interface for filling in weekly has 2 buttons: " publication template " and " filling in weekly "." publication template " only main energy of group Operation, " filling in weekly " community member can operate.
Employee C opens good friend G0, " publication template " is clicked in main interface, and upload the document of a table format.Member Work A1 also opens good friend G1, " publication template " is clicked in main interface, and upload a form document.
Employee A2 clicks " filling in weekly ", and as described in Example 5, the data processing module 103 of mobile phone application A2 is checked Members list simultaneously issues an inquiry request to all members by network communication module 104, and inquiry belongs to one of community G1 The referred to as object of weekly report template, mobile phone application A1 return the form document that employee A1 is uploaded to mobile phone application A2.Employee A2 The form document and fill substance have been downloaded, has then been uploaded again.Similarly, it is also to be issued using employee A1 that employee A3, which fills in weekly, Template.
Employee B2 clicks " filling in weekly ", as described above, its mobile phone application B2 inquires weekly report template in community G2 and receives Zero feedback, then the data processing module 103 of its mobile phone application B2 checks other communities and finds community G0, into community G0 Member issues inquiry request.The mobile phone application C of community G0 returns the form document oneself uploaded to mobile phone application B2.Employee B2 The form document and fill substance have been downloaded, has then been uploaded again.Similarly, it is also the mould using employee C that employee B3, which fills in weekly, Plate.
Above procedure illustrates enterprise and fills in how weekly function utilizes classification information (community's label) on user data The scene of carry out business diversification realization.It, can also be multi-layer community data by increasing access strategy 403 on user data The mode of access expands to ordinary circumstance: such as Fig. 5, data 1 are labeled as " ", community and 1 community of data where indicating visiting subscriber It is then accessible when matching;Data 2 are labeled as "+", can then visit when community includes 2 community of data where indicating visiting subscriber It asks;Data 3 are labeled as "-", indicate then accessible when community where visiting subscriber includes by 3 community of data.
After employee B1 is exited with the identity of group master from community G0, G2 community member, which will be unable to the community G0 mobile phone is accessed, to be answered The template issued with C.Same mobile phone application C also can not access strategy be "-" G2 community member generation data.
Embodiment 7: network is closed
As described in Example 4, one and another community can be added to which these isolated communities are connected into one in mobile phone application A unified network.As shown in Figure 5: user A is added behind some community in G1 is added some community in G2 again, thus indirectly It is connected to 2 independent networks.It as described in Example 3, can be in G2 net by the mobile phone application in mobile phone application A, G1 network Some user or access agent data are searched on network, similarly the mobile phone application in G2 network can also search for certain on G1 network A user or access agent data.
As only remaining party A-subscriber between G1, G2, A exits any one community and can disconnect between the two networks Connection.So that the key of network connectivty is grasped in online assistant's machine user hand on line.Equally, the group principal and subordinate of a community Another community, which exits, also can make the two communities become independent network again.
The network established by means of the present invention, network boundary (network boundary include by network, be connected with each other Network node constitute) and participant crowd quantity and behavior (into network, exitting network) be closely bound up.Participant The size and range of network can dynamically be changed by being added or exitting network, and realized each participant and known this network and open It closes, chooses whether whole network application should exist or with the presence of which kind of degree, realize a kind of physics under line in a vote jointly The strategy that digital world depth is bound in the world and line.
Embodiment 8: information security
During embodiment 1-7 passes through network transmitting user data, the token(token of node application generation), it includes add Token is sent to other side by other social softwares (such as wechat) by close ip address information etc., node users, and other side passes through importing Token also can establish connection.Specifically, in the present embodiment, the network communication module 104 of originating end can be according to the Kazakhstan of request end Uncommon character string (public key) is encrypted, and when data return to the network communication module 104 of request end, request end is needed according to oneself Hash character string (private key) be decrypted.It is obtained or is distorted by unauthorized personnel so as to avoid data.Same community member When needing pocket transmission news, encrypted with the Hash character string (public key) of community, the Hash that group members are needed after receiving with community Character string (private key) is decrypted.
It is searched in scene in the whole network, data all can have continuous re-encrypted in new community's forwarding every time and solve again Close process.
Embodiment 9: connection is established for application node using the website of concentration.
As described in Example 1, the present invention provides a kind of implementation method of the network application of decentralization, is answered by least two It is constituted with node.In addition to this, separately there is the example deployment of a network addressing service on network.
Above-mentioned network addressing service provides a kind of query interface, can be by one, the Hash of unique identification application node Character string (public key) inquires the current IP address of the application node.In addition also provide a kind of more new interface: application node can be with The Hash character string (public key) of oneself and current IP address are remained in network addressing service.
As described in Example 2, the IP address of the possible lost mobile phone application A of mobile phone application B.When mobile phone application B is answered to mobile phone When establishing connection failure with A, the network communication module 104 of mobile phone application B sends the Hash of mobile phone application A to network addressing service Character string (public key), network addressing service return to the IP address of newest mobile phone application A, and mobile phone application B is again to mobile phone application A Establish connection.
Embodiment 10: using the website of concentration come the functional characteristic for node application and development manufacturer distribution server end
As described in Example 1, the present invention provides a kind of implementation method of the network application of decentralization, is saved by least two applications Point is constituted.In addition to this, separately there is the example deployment of a characteristic distribution service on network.
In order to use characteristic distribution service, application and development manufacturer needs different functional characteristics to be packaged when developing software At individual program file, there is a master program file in these program files.Master program file constitutes the client in embodiment 1 End and server-side.Application node needs first to download and installs master program file when initializing.When other program files and main program When file is placed in the same installation directory or is put with the bibliographic structure of agreement, master program file can be other program files The functional characteristic of realization is integrated into client and server-side.
Above-mentioned characteristic distribution service provides a kind of query interface, and the client of node application can be inquired by the interface Complete functional characteristic list.If a certain item functional characteristic is deployed in current application node, installation condition is shown, And the functional characteristic that other are not disposed is then shown as the state that do not download.The functional characteristic that do not download when the user clicks.Node is answered The corresponding program file of service downloading is distributed by characteristic with client and is placed into suitable installation directory, such node is using just Has just-downloaded functional characteristic.
In addition to user clicks download function characteristic, it is special that corresponding function can also be downloaded when necessary by programmed logic Property.
The method enumerated by above embodiments, the network application of original centralized is filled in each networked devices by we (such as mobile phone) is inner, and the user by grasping this equipment establishes an interconnected network application, this network by social Each networked devices are dispersed in using the data of generation, form the network application of decentralization.Break through such a network Using must just break through each networked devices.When network application scale is bigger, the difficulty for breaking through this application is also got over Greatly.It is all local some application node of user is broken disaster.So as to effective protection data safety, avoid Data degradation, and then efficiently solve the problems, such as information security.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects Ground is described in detail, it should be understood that being not used to limit this hair the foregoing is merely a specific embodiment of the invention Bright protection scope.All within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all wrap Containing within protection scope of the present invention.

Claims (9)

1. a kind of implementation method of the network application of decentralization, which is characterized in that described to answer including at least two application nodes With establishing two-way connection between node,
The application node includes client and server-side, and the client receives user's input and feedback output, the clothes End reception client of being engaged in inputs, and returns and export to client;
The application node further includes node data, and each application node stores corresponding node data.
2. the implementation method of the network application of decentralization as described in claim 1, which is characterized in that the application node it Between establish two-way connection, approach includes: the application node by showing the two-dimensional barcode information containing IP address, other The face-to-face barcode scanning of application node establishes connection or realizes indirect association by forwarding two dimensional code;Or
One application node broadcast message in network establishes connection by matching broadcast message and the application node;Or Person
Token is sent to other application node by social software by one application node, and other application node passes through importing Token establishes connection;Or
One application node is contacted by the website concentrated with the foundation of other application node, and the website of the concentration assists using In the connection established between the application node and/or the functional characteristic for distributing its server-side.
3. the implementation method of the network application of decentralization as described in claim 1, which is characterized in that the node data packet It includes from master data and proxy data, the user data for being application node creation from master data and modifying;The agency Data are the user data that other application node entrusts the application node to store and/or manage.
4. the implementation method of the network application of decentralization as claimed in claim 1 or 2, which is characterized in that at least one institute It states application node and constitutes community, the node data between application node in same community can access mutually, different communities Node data between application node is forbidden accessing.
5. the implementation method of the network application of decentralization as claimed in claim 3, which is characterized in that answered described at least one Community is constituted with node, the proxy data between application node in same community can access mutually, the application of different communities Node data between node is forbidden accessing.
6. the implementation method of the network application of decentralization as claimed in claim 1 or 2, which is characterized in that at least one institute It states application node and constitutes community, the method for building up of the community, comprising the following steps:
It is requested Step 1: an application node establishes community to the initiation of other application node;
Step 2: other application node confirms, then community establishes.
7. the implementation method of the network application of decentralization as claimed in claim 1 or 2, which is characterized in that at least one institute It states application node and constitutes community, community of the node data of the application node according to belonging to it is grouped.
8. the implementation method of the network application of decentralization as claimed in claim 1 or 2, which is characterized in that the application section Point controls the range of the node data of other application node visit by being added or exiting community.
9. the implementation method of the network application of decentralization as claimed in claim 3, which is characterized in that answered described at least one Community is constituted with node, when the application node exits community, the autonomous data failure which possesses, the autonomous number According to corresponding proxy data in other application node failure.
CN201811032672.5A 2018-09-05 2018-09-05 Method for realizing decentralized network application Active CN109067905B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811032672.5A CN109067905B (en) 2018-09-05 2018-09-05 Method for realizing decentralized network application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811032672.5A CN109067905B (en) 2018-09-05 2018-09-05 Method for realizing decentralized network application

Publications (2)

Publication Number Publication Date
CN109067905A true CN109067905A (en) 2018-12-21
CN109067905B CN109067905B (en) 2021-03-16

Family

ID=64758550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811032672.5A Active CN109067905B (en) 2018-09-05 2018-09-05 Method for realizing decentralized network application

Country Status (1)

Country Link
CN (1) CN109067905B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213132A (en) * 2019-06-06 2019-09-06 深圳市网心科技有限公司 Network connectivity methods, electronic equipment, system and medium
CN114172752A (en) * 2021-10-21 2022-03-11 中国海洋大学 Group type interconnection method of nodes of Internet of things

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6031533A (en) * 1996-07-03 2000-02-29 Sun Microsystems, Inc. Graphical user interface for use in a de-centralized network environment
US20080235778A1 (en) * 2007-03-21 2008-09-25 Motorola, Inc. Communication network, an access network element and a method of operation therefor
CN102594888A (en) * 2012-02-16 2012-07-18 西北工业大学 Method for enhancing real-time performance of network file system
CN105227592A (en) * 2014-06-04 2016-01-06 科视点网络科技(北京)有限公司 A kind of Internet architecture and implementation method
CN107005453A (en) * 2014-06-13 2017-08-01 Abb瑞士股份有限公司 Method and system for the secure bidirectional communication of commercial plant
CN108156232A (en) * 2017-12-22 2018-06-12 王轶捷 Data sharing method and device
CN108199866A (en) * 2017-12-14 2018-06-22 上海交通大学 Social network system with strong secret protection
CN108471432A (en) * 2018-07-11 2018-08-31 北京智芯微电子科技有限公司 Prevent web application interface by the method for malicious attack

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6031533A (en) * 1996-07-03 2000-02-29 Sun Microsystems, Inc. Graphical user interface for use in a de-centralized network environment
US20080235778A1 (en) * 2007-03-21 2008-09-25 Motorola, Inc. Communication network, an access network element and a method of operation therefor
CN102594888A (en) * 2012-02-16 2012-07-18 西北工业大学 Method for enhancing real-time performance of network file system
CN105227592A (en) * 2014-06-04 2016-01-06 科视点网络科技(北京)有限公司 A kind of Internet architecture and implementation method
CN107005453A (en) * 2014-06-13 2017-08-01 Abb瑞士股份有限公司 Method and system for the secure bidirectional communication of commercial plant
CN108199866A (en) * 2017-12-14 2018-06-22 上海交通大学 Social network system with strong secret protection
CN108156232A (en) * 2017-12-22 2018-06-12 王轶捷 Data sharing method and device
CN108471432A (en) * 2018-07-11 2018-08-31 北京智芯微电子科技有限公司 Prevent web application interface by the method for malicious attack

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KEVIN TANG: "NOYB: Privacy in Online Social Networks,Saikat Guha", 《PAUL FRANCIS》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213132A (en) * 2019-06-06 2019-09-06 深圳市网心科技有限公司 Network connectivity methods, electronic equipment, system and medium
CN114172752A (en) * 2021-10-21 2022-03-11 中国海洋大学 Group type interconnection method of nodes of Internet of things

Also Published As

Publication number Publication date
CN109067905B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN1692616B (en) Network traffic control in peer-to-peer environments
CN100417130C (en) Semantic information network (SION)
US7251689B2 (en) Managing storage resources in decentralized networks
CN100533440C (en) Providing a service based on an access right to a shared data
US7181536B2 (en) Interminable peer relationships in transient communities
US7039701B2 (en) Providing management functions in decentralized networks
CN101123548B (en) An information service method and system in instant communication
CN111355780A (en) Block chain-based Internet of things monitoring management method and system
Kim et al. An MQTT-based context-aware autonomous system in oneM2M architecture
CN102202102A (en) Network service polymerization system and polymerization method thereof based on cloud computing configuration
CN102100032A (en) System from reputation shaping a peer-to-peer network
CN102959922A (en) Method, server and system for granting temporary access to electronic content
Aswale et al. An overview of internet of things: architecture, protocols and challenges
Kalofonos et al. Mynet: A platform for secure p2p personal and social networking services
CN107667550A (en) The method of request and its equipment are handled by polling channel in wireless communication system
CN109510758B (en) Session establishing method, terminal and system
CN105871698B (en) A kind of management method and system of instant messaging service
CN102185790A (en) Instant message processing and transmitting method with priority and instant messaging server
CN109067905A (en) A kind of implementation method of the network application of decentralization
CN102034144A (en) Group compositing algorithms for presence background
WO2001086494A1 (en) User profile management in a communications network
CN115840754A (en) Virtual resource management method and device and electronic equipment
Gluhak et al. Towards an architecture for a real world internet
KR101485764B1 (en) Domain Name Management Method Using Open API
CN102137042A (en) Instant messaging processing notification method with priority and instant messaging server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220906

Address after: Room B219, No. 180, Yuanxi Road, Dachang Street, Jiangbei New District, Nanjing City, Jiangsu Province, 210000

Patentee after: Nanjing Gongshi Technology Co.,Ltd.

Address before: 210005 23-1004, phase II, Longwan garden, 53 Changting street, moling street, Jiangning District, Nanjing City, Jiangsu Province

Patentee before: Huang Qiuqiong