CN116846531A - Information processing method, information processing device, electronic equipment and storage medium - Google Patents

Information processing method, information processing device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116846531A
CN116846531A CN202310621231.3A CN202310621231A CN116846531A CN 116846531 A CN116846531 A CN 116846531A CN 202310621231 A CN202310621231 A CN 202310621231A CN 116846531 A CN116846531 A CN 116846531A
Authority
CN
China
Prior art keywords
communication node
node
chain
alliance chain
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310621231.3A
Other languages
Chinese (zh)
Inventor
韩书君
蒋冠吾
许晓东
董辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202310621231.3A priority Critical patent/CN116846531A/en
Publication of CN116846531A publication Critical patent/CN116846531A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Optical Communication System (AREA)

Abstract

The application provides an information processing method, an information processing device, electronic equipment and a storage medium. The method comprises the following steps: establishing a alliance chain; the federation chain includes at least one communication node; all the communication nodes store a alliance chain account book; the alliance chain account book records all transmission data records of the alliance chain; responding to the fact that the storage capacity of a target communication node is larger than or equal to a first preset threshold value, and the number of all nodes in the alliance chain is larger than or equal to a second preset threshold value, and obtaining a light node according to the target communication node; the full node is a communication node for storing a complete alliance chain account book, and the light node is a light communication node. According to the application, the storage pressure of the communication nodes in the data chain can be relieved under the condition of not affecting the performance.

Description

Information processing method, information processing device, electronic equipment and storage medium
Technical Field
The present application relates to the field of information technologies, and in particular, to an information processing method, an information processing device, an electronic device, and a storage medium.
Background
With the development of internet technology, more and more digital application scenes appear. These digital application scenarios generally have high requirements on information exchange between multiple ends, safety and credibility of processing. The block chain technology has the characteristics of decentralization, non-tampering, safety, reliability and the like, and can meet the data transmission requirements of users.
A blockchain is essentially a de-centralized database. The blockchain technique synthesizes data blocks in a sequential manner into a ledger of a chain data structure in a time sequence. The account book is stored in the computing node of each blockchain, so that the computing node can verify the validity of the data, and the trusted computing of the data is further realized.
However, due to the characteristic that the account book is stored in a distributed manner by the blockchain technology, redundant data backup is easy to generate, and waste of storage resources is caused.
Disclosure of Invention
In view of the above, an object of the present application is to provide an information processing method, an information processing apparatus, an electronic device, and a storage medium.
Based on the above object, the present application provides an information processing method including:
establishing a alliance chain; the federation chain includes at least one communication node; all the communication nodes store a alliance chain account book; the alliance chain account book records all transmission data records of the alliance chain;
responding to the fact that the storage capacity of a target communication node is larger than or equal to a first preset threshold value, and the number of all nodes in the alliance chain is larger than or equal to a second preset threshold value, and obtaining a light node according to the target communication node; the full node is a communication node for storing a complete alliance chain account book, and the light node is a light communication node.
Optionally, the coalition chain comprises a core communication node and a non-core communication node; the core communication node is a communication node belonging to a core communication network, and the non-core communication node is a communication node not belonging to the core communication network;
the method further comprises the steps of:
establishing a private chain according to the core communication node; the core communication node stores a private chain account book; the private ledger records authentication data of all communication nodes in the federation chain.
Optionally, the method further comprises:
in response to determining that the storage amount of the target communication node is greater than or equal to a first preset threshold and that the number of all nodes in the coalition chain is less than a second preset threshold, requesting a communication node not belonging to the coalition chain from a core communication network;
adding a new communication node to the federation chain in response to determining that the new communication node of the core communication network was received; the new core communication node stores a complete alliance chain account book;
and obtaining a light node according to the target communication node.
Optionally, after requesting a communication node not belonging to the federation chain from a core communication network, the method further comprises:
and responding to the determination that the new communication node of the core communication network is not received, and requesting a user instruction from a user terminal corresponding to the alliance chain.
Optionally, after requesting a user indication from a user terminal corresponding to the federation chain, the method further includes:
and responding to the first user instruction sent by the user terminal, and obtaining a light node according to the target communication node.
Optionally, after requesting a user indication from a user terminal corresponding to the federation chain, the method further includes:
responding to the determination that a second user instruction sent by the user terminal is received, and requesting a communication node from other user terminals; and the other users join the alliance chain according to a preset admittance mechanism.
Optionally, the obtaining a light node according to the target communication node includes:
determining a alliance chain account book stored by the target communication node; the alliance chain account book comprises a block head and a block body;
and deleting the blocks of the alliance chain to obtain the light node.
Based on the same inventive concept, the present application also provides an information processing apparatus, comprising:
a building module configured to build a coalition chain; the federation chain includes at least one communication node; all the communication nodes store a alliance chain account book; the alliance chain account book records all transmission data records of the alliance chain;
the lightweight module is configured to obtain lightweight nodes according to the target communication nodes in response to determining that the storage capacity of the target communication nodes is greater than or equal to a first preset threshold and the number of all nodes in the alliance chain is greater than or equal to a second preset threshold; the full node is a communication node for storing a complete alliance chain account book, and the light node is a light communication node.
Based on the same inventive concept, the application also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the information processing method according to any one of the above.
Based on the same inventive concept, the present application also provides a non-transitory computer readable storage medium storing computer instructions for causing the computer to execute any one of the above-described information processing methods.
As can be seen from the above, the information processing method, apparatus, electronic device and storage medium according to the present application reduce the storage pressure of the communication nodes in the data link without affecting the performance by performing the light-weight processing on the account book in the communication node where the storage resources are excessively occupied.
Drawings
In order to more clearly illustrate the technical solutions of the present application or related art, the drawings that are required to be used in the description of the embodiments or related art will be briefly described below, and it is apparent that the drawings in the following description are only embodiments of the present application, and other drawings may be obtained according to the drawings without inventive effort to those of ordinary skill in the art.
FIG. 1 is a flow diagram of an information processing method according to one or more embodiments of the application;
FIG. 2 is a schematic diagram of an information processing apparatus according to one or more embodiments of the present application;
FIG. 3 is an application scenario diagram of an information processing method according to one or more embodiments of the present application;
fig. 4 is a schematic diagram of a hardware structure of an electronic device according to one or more embodiments of the present application.
Detailed Description
The present application will be further described in detail below with reference to specific embodiments and with reference to the accompanying drawings, in order to make the objects, technical solutions and advantages of the present application more apparent.
It should be noted that unless otherwise defined, technical or scientific terms used in the embodiments of the present application should be given the ordinary meaning as understood by one of ordinary skill in the art to which the present application belongs. The terms "first," "second," and the like, as used in embodiments of the present application, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that elements or items preceding the word are included in the element or item listed after the word and equivalents thereof, but does not exclude other elements or items. The terms "connected" or "connected," and the like, are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", etc. are used merely to indicate relative positional relationships, which may also be changed when the absolute position of the object to be described is changed.
The following describes one or more embodiments of the present application in detail by way of specific examples.
Referring to fig. 1, an information processing method of one or more embodiments of the present application includes the steps of:
step S101: establishing a alliance chain; the federation chain includes at least one communication node; all the communication nodes store a alliance chain account book; the federation chain ledger records all transmission data records of the federation chain.
In some embodiments, the federation chain may be established based on a communication path between the receiving and transmitting parties. In some embodiments, the communication node between the receiving and transmitting parties may be referred to as a blockchain computing node. In some embodiments, the optimal path between the transmitting end and the receiving end is first solved, and then the alliance chain is constructed according to all the communication nodes, the transmitting nodes and the receiving nodes corresponding to the optimal path.
The communication nodes comprise communication network nodes with certain computing capacity and storage capacity such as base stations, routers and the like, and the communication nodes need the capacity of carrying out hash computation and hash verification and carrying out computation and storage on a alliance chain account book.
In some embodiments, each communication node in the federation chain maintains a federation chain ledger that records all transmission data records of the federation chain. In some embodiments, the federation ledger write data includes log data of sender, receiver, time of transmission, etc., and specific data of transmission. In some embodiments, in response to determining that the user is communicating for the first time, a hash operation is performed on the write data to obtain a block header. In some embodiments, in response to determining that the user is not communicating for the first time, performing a hash operation on the write data to obtain a data hash; and carrying out hash operation on the data hash of the previous block area head and the block to obtain the block area head.
In some embodiments, the federation chain further includes corresponding admission mechanisms, consensus mechanisms, and intelligent contracts.
In some embodiments, the core communication node in the communication path may also be determined and then the private chain established from the core communication node. The core communication node is a communication node belonging to a core communication network. It will be appreciated that the federation chain includes core communication nodes and non-core communication nodes, where the non-core communication nodes are communication nodes that do not belong to the core communication network.
In some embodiments, each communication node in the private chain holds a private ledger that records authentication data for all communication nodes in the federation chain. Specifically, in some embodiments, the private ledger records system internal data as well as log data of network operations. In some embodiments, the system internal data includes information such as identity key, IP, MAC, time of network access, and validity period of each node, which is used to verify the identity of the communication node to ensure that each node in the network is legitimate.
In some embodiments, the core communication node may comprise a computing node in a core communication network. In some embodiments, a computing node belonging to a core communication network in a communication path may be selected. The core communication network can be regarded as highly trusted, so that a consensus mechanism and an incentive mechanism are not required to be set up for verification, and low resource consumption, high safety and high efficiency are ensured.
In some embodiments, the non-core communication node may include a computing node in the communication path that does not belong to the core communication network, such as a user side or other gateway node.
In some embodiments, other users besides the receiving user side and the sending user side may also join the federation chain through a preset admission mechanism.
Both the federation chain and the private chain belong to a blockchain.
Step S102: responding to the fact that the storage capacity of a target communication node is larger than or equal to a first preset threshold value, and the number of all nodes in the alliance chain is larger than or equal to a second preset threshold value, and obtaining a light node according to the target communication node; the full nodes are communication nodes for storing a complete alliance chain account book, and the light nodes are light-weight communication nodes.
The high decentralization of the blockchain is one of the greatest advantages, and the safety and the credibility of the blockchain network can be ensured. However, due to the decentralised design, public chains are faced with some efficiency problems in processing transactions and recording data. First, the blockchain needs to confirm the validity and integrity of the transaction through a consensus algorithm, which can take a long time. Second, the cost of storing and synchronizing data is high because each node on the blockchain needs to store all transaction records and state data. In addition, intelligent contracts on blockchains may result in slower execution speeds of transactions.
In carrying out the application, the applicant has found that when an account book only stores records of transmission data, it is not necessary that all communication nodes store the account book. That is, in some embodiments, since the federated chain ledger record transfers data, its data volume is very large, effectively a waste of storage resources when each communication node stores the ledger.
The applicant has thus proposed the solution of the present application. The technical scheme can be applied to a alliance chain system and also can be applied to a system comprising an alliance chain and a private chain. The technical scheme of the application can select whether to use the storage resource of the communication node as the light node according to whether the storage resource reaches the upper limit (namely the processing capacity of the communication node). The light node is more indirect than the full node, but has verification capability as well, even if the data of the user side is attacked or tampered, the federation chain account book maintained by other communication nodes in the federation chain can ensure the data security.
In some embodiments, setting the upper storage limit of the communication node results in a first preset threshold. And when the storage amount is greater than or equal to the first preset threshold value, indicating that the storage resource of the communication node is short.
And responding to the fact that the storage amount of any communication node in the alliance chain is larger than or equal to a first preset threshold value, and judging that the number of all nodes in the alliance chain is larger than or equal to a second preset threshold value, and determining that the alliance chain account book in the communication node can be light-weighted to obtain a light node so as to release the memory space of the communication node. The full nodes are communication nodes for storing a complete alliance chain account book, and the light nodes are light-weight communication nodes. The second preset threshold may be set manually.
In some embodiments, the technical solution of the present application further includes: requesting communication nodes not belonging to the alliance chain from a core communication network in response to determining that the storage amount of the target communication node is greater than or equal to a first preset threshold and the number of all nodes in the alliance chain is less than a second preset threshold; adding the new communication node to the federation chain in response to determining that a new communication node of the core communication network is received; the new core communication node stores a complete alliance chain account book; and obtaining a light node according to the target communication node. That is, when the storage resources of the communication node are insufficient and continuing to make weight reduction affects security, the core communication node is first requested to the core communication network as the storage resources.
In some embodiments, in response to determining that a new communication node of the core communication network has not been received, a user instruction is requested from a user terminal corresponding to the federation chain. That is, after the core communication network also has no redundant communication nodes assigned to the federation chain, a request is sent to the user to obtain a further indication of the user.
In some embodiments, after requesting the user indication from the user terminal corresponding to the federation chain, the method further includes: and responding to the first user instruction sent by the user terminal, and obtaining a light node according to the target communication node.
In some embodiments, after requesting the user indication from the user terminal corresponding to the federation chain, the method further includes: responding to the determination that a second user instruction sent by the user terminal is received, and requesting a communication node from other user terminals; and the other users join the alliance chain according to a preset admittance mechanism.
In some embodiments, a message may be sent to the user prompting the communication network for resources shortage, more data can only be guaranteed to verify correctly, but not guarantee recovery after being attacked or tampered, and the user's instruction is requested. In some embodiments, the first user instruction indicates no risk, and the target communication module is further lightened. In some embodiments, the second user instruction is to instruct other users joining the federation chain to request the communication node as a storage resource.
In some embodiments, the other users may request to join the federation chain through an admission mechanism, then the communication nodes in the federation chain may select a representative communication node through a voting algorithm, and finally the representative communication node rewards participation through an incentive mechanism to determine whether the other users are legal or not, and whether the other users may join the federation chain or not.
In some embodiments, the method for obtaining a light node includes: determining a alliance chain account book stored by the target communication node; the alliance chain account book comprises a block head and a block body; deleting the blocks of the alliance chains to obtain the light nodes.
It should be noted that, the method of the embodiment of the present application may be performed by a single device, for example, a computer or a server. The method of the embodiment can also be applied to a distributed scene, and is completed by mutually matching a plurality of devices. In the case of such a distributed scenario, one of the devices may perform only one or more steps of the method of an embodiment of the present application, the devices interacting with each other to accomplish the method.
It should be noted that the foregoing describes some embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
Based on the same inventive concept, the application also provides an information processing device corresponding to the method of any embodiment.
Referring to fig. 2, the information processing apparatus includes:
a building module 11 configured to build a coalition chain; the federation chain includes at least one communication node; all the communication nodes store a alliance chain account book; the federation chain ledger records all transmission data records of the federation chain.
A light weight module 12 configured to obtain light nodes according to the target communication node in response to determining that the storage amount of the target communication node is greater than or equal to a first preset threshold and the number of all nodes in the coalition chain is greater than or equal to a second preset threshold; the full nodes are communication nodes for storing a complete alliance chain account book, and the light nodes are light-weight communication nodes.
In some embodiments, the establishing module 11 further includes: establishing a private chain according to the core communication node; the core communication node stores a private chain account book; the private ledger records authentication data of all communication nodes in the federation chain. The alliance chain comprises a core communication node and a non-core communication node; the core communication node is a communication node belonging to a core communication network, and the non-core communication node is a communication node not belonging to the core communication network.
In some embodiments, the lightweight module 12 described above is further configured to: requesting communication nodes not belonging to the alliance chain from a core communication network in response to determining that the storage amount of the target communication node is greater than or equal to a first preset threshold and the number of all nodes in the alliance chain is less than a second preset threshold; adding the new communication node to the federation chain in response to determining that a new communication node of the core communication network is received; the new core communication node stores a complete alliance chain account book; and obtaining a light node according to the target communication node.
In some embodiments, the lightweight module 12 is specifically configured to: after requesting a communication node not belonging to the federation chain from a core communication network, requesting a user instruction from a user terminal corresponding to the federation chain in response to determining that a new communication node of the core communication network is not received.
In some embodiments, the lightweight module 12 is specifically configured to: after requesting user indication to the user terminal corresponding to the alliance chain, responding to the first user instruction sent by the user terminal, and obtaining a light node according to the target communication node.
In some embodiments, the lightweight module 12 is specifically configured to: after requesting a user instruction to the user terminal corresponding to the alliance chain, responding to the determination that a second user instruction sent by the user terminal is received, and requesting a communication node to other user terminals; and the other users join the alliance chain according to a preset admittance mechanism.
In some embodiments, the lightweight module 12 is specifically configured to: determining a alliance chain account book stored by the target communication node; the alliance chain account book comprises a block head and a block body; deleting the blocks of the alliance chains to obtain the light nodes.
For convenience of description, the above devices are described as being functionally divided into various modules, respectively. Of course, the functions of each module may be implemented in the same piece or pieces of software and/or hardware when implementing the present application.
The device of the foregoing embodiment is configured to implement the corresponding information processing method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which is not described herein.
Fig. 3 is an application scenario diagram of an information processing method according to one or more embodiments of the present application. An information processing method according to one or more embodiments of the present application will be described below with reference to fig. 3 as an example.
First, an optimal path between a transmitting user and a receiving user is determined. Different ways of determining the optimal path can achieve the corresponding purpose, and the protection scope of the application is not affected by different methods.
Then, all communication nodes including the transmitting user and the receiving user are determined according to the optimal path. Constructing a private chain according to the core communication node in the communication nodes; and constructing a alliance chain according to the non-core communication nodes in the communication nodes. It will be appreciated that the communication nodes in the private chain belong to the federation chain at the same time. The communication nodes in the alliance chain store an alliance chain account book, and the communication nodes in the private chain store a private chain account book. The federation chain ledger mainly records all transmission data records of the federation chain. The private ledger mainly records information for verifying the identity of the communication node. Therefore, the data recorded by the private ledger is more important, and the data of the private ledger is not lightened in order to ensure the safety of data transmission. The public chain account book records have the advantages that the data are redundant, a large amount of storage resources are occupied, and the data can be safely transmitted without all communication nodes storing the data, so that the public chain account book records can be light.
Then, in the data transmission process, as the transmission record is generated, the content of the alliance chain account book is gradually increased, and at this time, the communication nodes of the alliance chain can be lightened according to actual conditions.
The specific implementation method is as described in step S101 to step S102, and will not be described herein.
Based on the same inventive concept, the application also provides an electronic device corresponding to the method of any embodiment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor implements the information processing method of any embodiment when executing the program.
Fig. 4 shows a more specific hardware architecture of an electronic device according to this embodiment, where the device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 implement communication connections therebetween within the device via a bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit ), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc. for executing relevant programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory ), static storage device, dynamic storage device, or the like. Memory 1020 may store an operating system and other application programs, and when the embodiments of the present specification are implemented in software or firmware, the associated program code is stored in memory 1020 and executed by processor 1010.
The input/output interface 1030 is used to connect with an input/output module for inputting and outputting information. The input/output module may be configured as a component in a device (not shown) or may be external to the device to provide corresponding functionality. Wherein the input devices may include a keyboard, mouse, touch screen, microphone, various types of sensors, etc., and the output devices may include a display, speaker, vibrator, indicator lights, etc.
Communication interface 1040 is used to connect communication modules (not shown) to enable communication interactions of the present device with other devices. The communication module may implement communication through a wired manner (such as USB, network cable, etc.), or may implement communication through a wireless manner (such as mobile network, WIFI, bluetooth, etc.).
Bus 1050 includes a path for transmitting information between various components of the device (e.g., processor 1010, memory 1020, input a/output interface 1030, and communication interface 1040).
It should be noted that although the above-described device only shows processor 1010, memory 1020, input/output interface 1030, communication interface 1040, and bus 1050, in an implementation, the device may include other components necessary to achieve proper operation. Furthermore, it will be understood by those skilled in the art that the above-described apparatus may include only the components necessary to implement the embodiments of the present description, and not all the components shown in the drawings.
The electronic device of the foregoing embodiment is configured to implement the corresponding information processing method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which is not described herein.
Based on the same inventive concept, the present application also provides a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the information processing method according to any of the above embodiments, corresponding to the method according to any of the above embodiments.
The computer readable media of the present embodiments, including both permanent and non-permanent, removable and non-removable media, may be used to implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The storage medium of the above embodiment stores computer instructions for causing the computer to execute the information processing method according to any one of the above embodiments, and has the advantages of the corresponding method embodiments, which are not described herein.
Those of ordinary skill in the art will appreciate that: the discussion of any of the embodiments above is merely exemplary and is not intended to suggest that the scope of the application (including the claims) is limited to these examples; the technical features of the above embodiments or in the different embodiments may also be combined within the idea of the application, the steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the application as described above, which are not provided in detail for the sake of brevity.
Additionally, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures, in order to simplify the illustration and discussion, and so as not to obscure the embodiments of the present application. Furthermore, the devices may be shown in block diagram form in order to avoid obscuring the embodiments of the present application, and also in view of the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the embodiments of the present application are to be implemented (i.e., such specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the application, it should be apparent to one skilled in the art that embodiments of the application can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative in nature and not as restrictive.
While the application has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of those embodiments will be apparent to those skilled in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic RAM (DRAM)) may use the embodiments discussed.
The present embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Therefore, any omissions, modifications, equivalent substitutions, improvements, and the like, which are within the spirit and principles of the embodiments of the application, are intended to be included within the scope of the application.

Claims (10)

1. An information processing method, characterized by comprising:
establishing a alliance chain; the federation chain includes at least one communication node; all the communication nodes store a alliance chain account book; the alliance chain account book records all transmission data records of the alliance chain;
responding to the fact that the storage capacity of a target communication node is larger than or equal to a first preset threshold value, and the number of all nodes in the alliance chain is larger than or equal to a second preset threshold value, and obtaining a light node according to the target communication node; the full node is a communication node for storing a complete alliance chain account book, and the light node is a light communication node.
2. The information processing method according to claim 1, wherein the federation chain includes a core communication node and a non-core communication node; the core communication node is a communication node belonging to a core communication network, and the non-core communication node is a communication node not belonging to the core communication network;
the method further comprises the steps of:
establishing a private chain according to the core communication node; the core communication node stores a private chain account book; the private ledger records authentication data of all communication nodes in the federation chain.
3. The information processing method according to any one of claims 1 or 2, characterized in that the method further comprises:
in response to determining that the storage amount of the target communication node is greater than or equal to a first preset threshold and that the number of all nodes in the coalition chain is less than a second preset threshold, requesting a communication node not belonging to the coalition chain from a core communication network;
adding a new communication node to the federation chain in response to determining that the new communication node of the core communication network was received; the new core communication node stores a complete alliance chain account book;
and obtaining a light node according to the target communication node.
4. An information processing method according to claim 3, wherein after requesting a communication node not belonging to the federation chain from a core communication network, the method further comprises:
and responding to the determination that the new communication node of the core communication network is not received, and requesting a user instruction from a user terminal corresponding to the alliance chain.
5. The information processing method according to claim 4, wherein after requesting a user instruction from a user terminal corresponding to the federation chain, the method further comprises:
and responding to the first user instruction sent by the user terminal, and obtaining a light node according to the target communication node.
6. The information processing method according to claim 4, wherein after requesting a user instruction from a user terminal corresponding to the federation chain, the method further comprises:
responding to the determination that a second user instruction sent by the user terminal is received, and requesting a communication node from other user terminals; and the other users join the alliance chain according to a preset admittance mechanism.
7. The information processing method according to any one of claims 1 or 2, wherein the obtaining a light node from the target communication node includes:
determining a alliance chain account book stored by the target communication node; the alliance chain account book comprises a block head and a block body;
and deleting the blocks of the alliance chain to obtain the light node.
8. An information processing apparatus, characterized by comprising:
a building module configured to build a coalition chain; the federation chain includes at least one communication node; all the communication nodes store a alliance chain account book; the alliance chain account book records all transmission data records of the alliance chain;
the lightweight module is configured to obtain lightweight nodes according to the target communication nodes in response to determining that the storage capacity of the target communication nodes is greater than or equal to a first preset threshold and the number of all nodes in the alliance chain is greater than or equal to a second preset threshold; the full node is a communication node for storing a complete alliance chain account book, and the light node is a light communication node.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 7 when the program is executed by the processor.
10. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1 to 7.
CN202310621231.3A 2023-05-29 2023-05-29 Information processing method, information processing device, electronic equipment and storage medium Pending CN116846531A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310621231.3A CN116846531A (en) 2023-05-29 2023-05-29 Information processing method, information processing device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310621231.3A CN116846531A (en) 2023-05-29 2023-05-29 Information processing method, information processing device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116846531A true CN116846531A (en) 2023-10-03

Family

ID=88164240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310621231.3A Pending CN116846531A (en) 2023-05-29 2023-05-29 Information processing method, information processing device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116846531A (en)

Similar Documents

Publication Publication Date Title
US11501533B2 (en) Media authentication using distributed ledger
CN108985757B (en) Information processing method, device and system, storage medium and electronic equipment
CN111490878B (en) Key generation method, device, equipment and medium
CN113395363B (en) Data processing method, device and equipment based on block chain and storage medium
CN112862612A (en) Method and device for sending resources in cross-link mode
CN113570466B (en) Transaction data processing method and device and readable storage medium
CN111476572B (en) Block chain-based data processing method, device, storage medium and equipment
CN110659905B (en) Transaction verification method, device, terminal equipment and storage medium
CN110334542B (en) Network evidence preservation and network evidence preservation verification method and device
CN111814173B (en) Work file storage method, copyright confirmation method and device
CN113326165B (en) Data processing method and device based on block chain and computer readable storage medium
CN111031519B (en) Terminal access authentication method and device based on edge calculation
CN112559635B (en) Service processing method, device, equipment and medium for Ethernet alliance chain node
CN110660466A (en) Personal health data chaining method and system of Internet of things by combining block chains
CN113220640B (en) Arbitration method and device based on block chain
CN113162971B (en) Block link point management method, device, computer and readable storage medium
CN113409047A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN111899104B (en) Service execution method and device
CN110858211B (en) Data storage method, device and system and storage medium
CN116055403A (en) Message data transmission method, device and server
CN116846531A (en) Information processing method, information processing device, electronic equipment and storage medium
CN116701452A (en) Data processing method, related device, storage medium and program product
CN115842866A (en) Data processing method and device, computer readable medium and electronic equipment
CN112487065A (en) Data retrieval method and device
CN115174589B (en) Selection method and device of blockchain virtual machine, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination