WO2022033284A1 - 一种锥体区块、锥体区块链结构和方法 - Google Patents

一种锥体区块、锥体区块链结构和方法 Download PDF

Info

Publication number
WO2022033284A1
WO2022033284A1 PCT/CN2021/107673 CN2021107673W WO2022033284A1 WO 2022033284 A1 WO2022033284 A1 WO 2022033284A1 CN 2021107673 W CN2021107673 W CN 2021107673W WO 2022033284 A1 WO2022033284 A1 WO 2022033284A1
Authority
WO
WIPO (PCT)
Prior art keywords
block
cone
node
blocks
user
Prior art date
Application number
PCT/CN2021/107673
Other languages
English (en)
French (fr)
Inventor
李俊
李晶宇
武少华
Original Assignee
山西特信环宇信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 山西特信环宇信息技术有限公司 filed Critical 山西特信环宇信息技术有限公司
Publication of WO2022033284A1 publication Critical patent/WO2022033284A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Definitions

  • the invention belongs to the technical field of chain data structures, and in particular relates to a cone block, a cone block chain structure and a method.
  • the blockchain is a distributed system that uses a chain data structure to store information. It is a decentralized distributed database. convinced can become a node of the blockchain to use and maintain this database.
  • the blockchain is a chain structure with blocks as the unit. Each block generates and stores transaction data over time.
  • a block is composed of a block header and a block body.
  • the information contained in the block header includes the version number, the previous block
  • the block body mainly contains transaction information.
  • the chain structure of the blockchain prevents the information in the block from being tampered to a certain extent.
  • it requires a lot of computing power, and the probability of successful tampering is almost zero.
  • blockchain As a new type of technology, blockchain also has some deficiencies.
  • the storage capacity is limited.
  • the block size of mainstream blockchains has certain limitations. If the capacity is expanded, it needs to face the problem of poor data synchronization.
  • the blockchain consumes a lot of energy.
  • the consensus mechanism of blockchain technology is developing towards the proof-of-stake mechanism to reduce energy consumption, the current mainstream blockchain blocks still need to be mined, and the mining process requires a lot of resources , resulting in a lot of waste of resources.
  • the blockchain transaction data delay is very high, and the transaction confirmation time is long, and there is still a big gap compared with the centralized trading platform.
  • the blockchain can store a large amount of information, but in practical application scenarios, too much information needs to be continuously updated. Since the blockchain information cannot be modified, the same information needs to be input multiple times, resulting in serious information redundancy in the blockchain. Therefore, it is necessary to establish a new type of blockchain structure.
  • the present invention provides a cone block, a cone block chain structure and method, which can solve the problems of small block chain capacity, high block chain energy consumption, low block chain efficiency and decentralization.
  • the unregulated problem of the model is a cone block, a cone block chain structure and method, which can solve the problems of small block chain capacity, high block chain energy consumption, low block chain efficiency and decentralization.
  • the technical scheme adopted in the present invention is:
  • a cone block comprising a node block, an itemized unit block and a user block, and the node block, the itemized unit block and the user block are connected to form a cone block;
  • the node block is the top-level block of the pyramid block
  • the itemized unit block is the middle-level block of the pyramid block, belongs to the classification block of the node block, and is a sub-block of the node block;
  • the user block is the bottom block of the pyramid block.
  • Node block, itemized unit block and user block are composed of block header and block body.
  • the block header mainly contains block code, associated block hash value, service network address, server identification, timestamp, management Member information hash value and block content hash value; block body contains administrator information and block content.
  • the node block summarizes the information of the itemized unit block and performs relevant authorization verification; the itemized unit block is generated by the application of the node block, and is divided into different types of itemized unit blocks; the user block is processed by the itemized unit block When the application is generated, the itemized unit block performs authorization verification on the user block information, and the user block performs authorization verification on the specific information.
  • User blocks can be extended downward to form secondary unit blocks, secondary user blocks, and pyramidal blocks are also formed between user blocks, secondary unit blocks and secondary user blocks.
  • a cone block chain structure includes several cone blocks, one of which is the total cone block, and the other cone blocks are divided according to their categories or properties:
  • Cone blocks of the same category or nature are located in the same column, and the node blocks in the pyramid blocks on the same column are connected to form a linear chain;
  • the linear chains intersect the node blocks in the total cone block, forming the cone block chain structure.
  • Cone blocks on the same column are layered according to levels and form a private chain according to the associated consensus relationship. Cone blocks with the same level are in the same layer; linear chains in different columns form a conical alliance chain according to the consensus relationship.
  • each node block According to the positioning in the pyramidal blockchain structure according to the node code, the creation block of each node block is generated; each node block generates the sub-unit block code respectively, and applies for the registration of different sub-unit blocks; After the unit block is generated, each user block code is generated to apply for the user block.
  • a method for constructing a cone block chain The specific generation process of the genesis block of the node block is as follows:
  • the management agency shall authenticate the legal person
  • the node block legal person authorizes the node block administrator, and the administrator identity authentication is passed;
  • Node block code, service network address, server ID, timestamp, administrator information, and block content generate the node creation block.
  • the registration generation process of the itemized unit block and the user block is as follows:
  • the node block is located in the cone blockchain according to the node code
  • S5 itemized unit block code, service network address, server identification, time stamp, administrator information, block content to generate itemized unit block;
  • the cone blocks of the cone block chain can be divided into main blocks and sub-blocks.
  • the content management main block is the main block, and the block formed by the associated consensus storage content is Secondary block; the verification block is generated by the certification of the main block; the associated verification block is the combination of the verification content of the associated block, and the associated verification block is generated.
  • the content of the user block is mainly composed of micro-blocks, and the content of the micro-block is generated by the user block authentication, which is the specific relevant authentication information, and the micro-block chain is generated according to the associated consensus relationship between the micro-blocks.
  • the present invention has the following beneficial effects:
  • the pyramidal blockchain structure includes node blocks, itemized unit blocks, user blocks, secondary unit blocks, microblocks, etc. Each block is connected to each other to form a cone network structure, and it is also a new type of cone network data hierarchical storage method. Different blocks are associated through hash values, and a consensus algorithm is used between data blocks at each level to ensure the consistency of information. , expanded the capacity of the blockchain, solved the problems of energy consumption and efficiency of the blockchain, realized the multi-center chain authentication service, and solved the unsupervised problem of the decentralized mode of the blockchain.
  • Fig. 1 is a kind of structural representation of cone block of the present invention
  • Fig. 2 is another kind of structural representation of the cone block of the present invention.
  • Fig. 3 is the structural schematic diagram of the cone block chain of the present invention.
  • Fig. 4 is the connection schematic diagram of the cone block of the present invention.
  • Fig. 5 is the block generation flow schematic diagram of the present invention.
  • Fig. 6 is the block structure schematic diagram of the present invention.
  • Fig. 7 is the schematic diagram of the relationship between the user block and the micro-block of the present invention.
  • Fig. 8 is the schematic diagram of the relationship between the verification block and the micro-block of the present invention.
  • FIG. 9 is a schematic diagram of an embodiment of the relationship between the pyramid blocks of the present invention.
  • Fig. 10 is the flow chart of the creation block generation of the node block of the present invention.
  • cone block including node block, itemized unit block and user block, node block, itemized unit block and user block are connected to form cone block;
  • the node block is the top-level block of the pyramid block
  • the itemized unit block is the middle-level block of the pyramid block, belongs to the classification block of the node block, and is a sub-block of the node block;
  • the user block is the bottom block of the pyramid block.
  • each sub-block in the cone block is composed of a block header and a block body, where the block header mainly contains the block code, associated block hash value, service network address, server ID, time Stamp, administrator information hash value, block content hash value, block body contains administrator information, block content.
  • the administrator information includes the administrator's registration, modification, and cancellation;
  • the block content includes verification content, associated verification content, and other block content.
  • the user block can apply for a secondary unit block and a secondary user block according to its own service content, such as providing a public platform; the user block, the secondary unit block and the secondary user block It also constitutes a cone block.
  • Some institutions also have no user block, or no sub-unit block.
  • a cone block chain structure includes several cone blocks, one of which is the total cone block, and the other cone blocks are divided according to their categories or properties:
  • the pyramid blocks of the same category or nature are located in the same column, and the node blocks in the pyramid blocks on the same column are connected to form a linear chain; according to different categories or properties, a linear chain of several columns is formed; The linear chains of different columns intersect with the node blocks in the total pyramid block, forming a pyramid block chain structure as a whole.
  • the specific category or nature of the division can be determined according to the application scenario. For example, take the country as an example, where the country is the total cone block, and other cone blocks are divided according to the nature of the department: Ministry of Public Security, Ministry of Education, Ministry of Justice Department, etc.
  • cone blocks on the same column are layered according to levels and form a private chain according to the associated consensus relationship; linear chains in different columns form a cone alliance chain according to the consensus relationship; cones with the same level A block includes more than one conical block of the same level on the same level, that is, on the same level in the same row.
  • Private chain institutions of the same nature, located in the same column of the cone block chain, each cone block forms a private chain according to the consensus relationship; alliance chain: institutions of different nature, located in different columns of the cone block chain, each cone block
  • the body block forms a consortium chain according to the consensus relationship; specifically: it can be divided into different levels 3-6 according to the ownership level (or subordinate level).
  • Shanxi Provincial Public Security is a private chain
  • Shanxi Civil Affairs Bureau is an alliance chain
  • the overall process is as follows: first, the node blocks are positioned in the pyramidal blockchain structure according to the node block code, and the genesis block of each node block is generated; then each node block generates the sub-unit block code respectively, and applies for registration Different itemized unit blocks; after the itemized unit block is generated, apply for a user block. Further, if the user block is a legal person user, it can also apply for a second-level unit block, a second-level user block, and so on.
  • the node block code is applied for in the cone block chain, which is used to locate the position of the node block in the cone block chain.
  • the hierarchical relationship between the sub-unit block code and the user block code contains the node block code. It is the identification of the nature and function of the itemized unit block and the user block.
  • the code of the node block and the sub-unit block in the cone blockchain is composed of the code number of the sovereign state, the code number formed by the classification of state ownership, and the code number formed by the division of management properties.
  • China's total cone block code is 86
  • the public security property code is A
  • the civil affairs property code is B
  • Shanxi Provincial Public Security 86A03 Shuozhou Public Security 86A0303
  • Pinglu Public Security 86A030301 Shanxi Civil Affairs 86B03
  • Shuozhou Civil Affairs 86B0303 Pinglu Public Security 86B03 Lu Minzheng 86B030301 and so on.
  • the coding of the user block is determined by the content stored in the user block, and the block body contains various verification contents and is associated with the verification contents.
  • the management agency shall authenticate the legal person
  • the node block legal person authorizes the node block administrator, and the administrator identity authentication is passed;
  • Node block code, service network address, server ID, timestamp, administrator information, and block content generate the node creation block.
  • a provincial public security organ when a provincial public security organ creates a genesis block, it must first obtain the node block code of the provincial public security organ, and then carry out the public security organ legal person authentication. After the legal person identity authentication is passed, register the public security organ node block service network address and server ID , and the authorized administrator of the public security organ.
  • the public security organ block code, service network address, server identification, time stamp, administrator information, and block content generate the public security organ node block.
  • the registration generation process of the itemized unit block and the user block is:
  • the node block is located in the cone blockchain according to the node code
  • the itemized unit block code, service network address, server identifier, time stamp, administrator information, and block content generate an itemized unit block.
  • the node block of the public security organ is located in the cone block chain according to the node block code, and different sub-unit blocks are applied for registration according to the different functions of the internal department of the public security organ, such as criminal investigation, public security, household administration, special
  • the sub-unit block of the industry and at the same time form the corresponding sub-unit block code
  • each department of the public security organ authorizes the sub-unit block administrator, and registers the sub-unit block service network address and server ID;
  • the sub-unit block code, service network address, server identification, time stamp, administrator information, and block content of each department of the agency generate the sub-unit block corresponding to each department.
  • the user block of each department of the public security organ is the specific information of the individual user.
  • the user block of the household administration department records a person's name, date of birth, family relationship, and so on.
  • the user block code, service network address, server identification, timestamp, administrator information, block content, and the user block of a person who generated the public security household administration department is a person's name, date of birth, family relationship, and so on.
  • the cone blocks of the cone block chain can be divided into main blocks and sub-blocks according to the association relationship of the blocks.
  • the block formed by the associated consensus storage content such as the same column and the same layer, different columns and different layers, etc. is the secondary block; the verification block is generated by the certification of the main block; the associated verification block is the verification content of the associated block combination to generate an associated verification block.
  • a person's education information needs to be stored in the Ministry of Education and a company.
  • Educational information is the main block for the relevant blocks of the Ministry of Education, which can be modified and authenticated.
  • the block of a company's personnel department it is a sub-block, and the education information cannot be modified, only records are made.
  • the content of the user block is mainly divided into the content that needs to be verified and the content that does not need to be verified, and the content that needs to be verified is further divided into the classification of verification content and associated verification content, forming different micro-blocks.
  • the verification of the information belonging to this block in the micro-block directly generates the micro-block, and some information needs to be obtained from other blocks, and only the verification blocks of other blocks are obtained, and these blocks constitute the micro-block of this block. Piece.
  • the academic qualification information of a specific student is stored in the Ministry of Education, recorded in the relevant departments of academic qualifications (item-based unit block), and a verification block of the student's academic qualification information is generated.
  • the personnel department (sub-unit block) of this institution needs to record and certify the student's educational information
  • the company's personnel department obtains the information of the verification block of the academic department
  • the specific information is recorded in the company's information about the student in the microblock of the user block.
  • the information comes from the verification block generated by the education department of the Ministry of Education (sub-unit block).
  • micro-block information of the student's block comes from the associated verification block, such as name and gender.
  • the name information comes from the public security agency, and the gender information comes from the relevant department of the hospital.
  • the formed micro-block is The associated verification blocks of public security and hospital related departments are generated.
  • the node block is the top-level block of the pyramid block, which receives the hash value of the associated block and plays the role of information aggregation.
  • the block header contains the node block code, the block hash value of the same column and the same layer node, the block hash value of the upper and lower nodes in the same column, the block hash value of the non-column and the same layer node, the service network address, the server ID, the timestamp, Administrator information hash value, verification content hash value, associated verification content hash value, other block content hash value, block body contains administrator information, verification content, associated verification content, and other block content.
  • the same column and the same layer means that the cone block is located in the same column of the cone block chain, and the geographical level is the same;
  • the upper and lower levels of the same column refer to the columns of the same nature that the cone blocks are located in the cone block chain, and the geographical levels are adjacent;
  • Non-column and same layer refers to the fact that the cone blocks are located in different columns of the cone block chain, and the geographical level is the same;
  • the itemized unit block is the middle-level block of the pyramid block, which is connected to other blocks through hash values.
  • the itemized unit block is a department-specific block, which is also composed of block header and block body.
  • the block header contains the itemized unit block code, the same column and same layer itemized unit block hash value, the same column upper and lower level itemized unit block hash value, the non-column and same layer itemized unit block hash value, Service network address, server ID, timestamp, administrator information hash value, verification content hash value, associated verification content hash value, other block content hash value, the block body contains administrator information, verification content, association Verification content, other block content.
  • the user block is at the bottom of the cone block, which is the bottom block of the cone block chain and has the largest number.
  • the user block is composed of a block header and a block body.
  • Block code, hash value of other associated blocks, service network address, server ID, timestamp, hash value of administrator information, hash value of verification content, hash value of associated verification content, block body contains administrator information, verification content, the associated verification content.
  • Administrator information mainly includes administrator registration, modification, and logout. All blocks have administrators, and the role of administrators is to manage the entire block information. Authenticate, modify, and record information.
  • Cone blockchain information authentication is stored as according to the type of information, the area where the information is located, and the time period when the information is generated, and different information is recorded in different institutional sub-unit blocks according to different distribution mechanisms.
  • This institution is the authoritative department for such information in the region.
  • the department authenticates and authorizes the information. If the information is correct, it can be recorded in the cone block chain together with the authorization.
  • Scenario 1 Ordinary user A and ordinary user B get married, and the identity authentication information of ordinary user A and ordinary user B is stored in the public security bureau (item unit block). The identity information of ordinary users A and B is verified, and it is determined that the identity information of ordinary users A and B is correct. Similarly, the relevant departments of the hospital (sub-unit block) can also verify that there are no diseases that are not suitable for marriage between ordinary users A and B. Equivalent to pre-marital verification. When the verification of the above-mentioned relevant departments is satisfied, ordinary users A and B can go to the relevant departments of the Civil Affairs Bureau (item-based unit block) for marriage registration, and the specific marriage information is recorded in the relevant departments of the Civil Affairs Bureau (item-based unit block). If you want to verify the marriage information of ordinary users A and B, you need to verify the verification blocks generated by the sub-unit blocks of the relevant departments of the Civil Affairs Bureau.
  • Scenario 2 Ordinary user A works in company C. First, the identities of ordinary user A and company C must be verified in the relevant departments of the Public Security Bureau (sub-unit block) and relevant departments of industry and commerce (sub-unit block). Prove that the identity information is correct, and then ordinary user A needs to register the identity information of ordinary user A by the personnel department (secondary unit block) of company C to work in company C. Recorded in the personnel department of company C (second-level unit block), if you want to verify whether ordinary user A works in company C, you only need to verify the verification block generated by the second-level unit block.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

一种锥体区块、锥体区块链结构和方法,包括节点区块、分项单元区块和用户区块,节点区块、分项单元区块和用户区块连接构成锥体区块;节点区块为锥体区块的顶层区块;分项单元区块为锥体区块的中层区块,属于节点区块的分类区块,是节点区块的子区块;用户区块为锥体区块的底层区块。各个区块相互连接形成锥体网络结构,同时也是新型锥体网络数据分层存储方法,不同区块之间通过哈希值关联,各层级数据区块之间采用共识算法,确保信息的一致性,扩大了区块链的容量,解决了区块链耗能和区块链效率等问题,实现了多中心链式认证服务,解决了区块链去中心化模式存在的无监管问题。

Description

一种锥体区块、锥体区块链结构和方法 技术领域
本发明属于链式数据结构技术领域,具体涉及一种锥体区块、锥体区块链结构和方法。
背景技术
区块链是链式数据结构用来储存信息的分布式***,是一个去中心化的分布式数据库,任何人都可以成为区块链的节点使用并且维护这个数据库。
区块链是以区块为单位的链式结构,每一个区块都随时间产生并且储存交易数据,区块是由区块头和区块体构成,区块头包含的信息有版本号、前一块区块的哈希值、时间戳、随机数、本区块所有数据的默克尔根值、难度目标等信息,区块体则主要包含交易信息。
区块链的链状结构一定程度上防止了区块里的信息被篡改,为了匹配链式结构的所有区块的哈希值,需要极大算力,篡改成功几率几乎为零。
区块链作为一种新型技术也存在一些不足,存储容量有限,目前主流区块链的区块大小都有一定的限制,如果扩容需要面临数据同步性差的问题。
区块链耗能严重,虽然区块链技术的共识机制向权益证明机制发展,来减少能源消耗,但目前主流的区块链区块还需要挖矿产生,挖矿的过程需要非常多的资源,造成大量资源浪费。
区块链交易数据延迟很高,交易确认时间长,与有中心的交易平台相比还有很大差距。
区块链没有相关机构进行监管,导致区块链技术应用于非常多黑色产业中,对区块链应用国家法律监管有一定难度。
区块链可以储存大量的信息,但实际应用场景中太多的信息是需要不断更新的,由于区块链信息不能修改,同一信息需要多次输入,导致区块链信息冗余严重。因此一个新型的区块链结构建立十分必要。
发明内容
针对上述技术问题,本发明提供了一种锥体区块、锥体区块链结构和方法,可以解决了区块链容量小、区块链耗能高、区块链效率低以及去中心化模式存在的无监管问题。
为了解决上述技术问题,本发明采用的技术方案为:
一种锥体区块,包括节点区块、分项单元区块和用户区块,节点区块、分项单元区块和用户区块连接构成锥体区块;
节点区块为锥体区块的顶层区块;
分项单元区块为锥体区块的中层区块,属于节点区块的分类区块,是节点区块的子区块;
用户区块为锥体区块的底层区块。
节点区块、分项单元区块和用户区块均由区块头和区块体组成,其中区块头主要含有区块编码、关联区块哈希值、服务网络地址、服务器标识、时间戳、管理员信息哈希值和区块内容哈希值;区块体含有管理员信息和区块内容。
节点区块汇总分项单元区块的信息并进行相关授权验证;分项单元区块经节点区块申请生成,并分为不同类的分项单元区块;用户区块经分项单元区块申请生成,分项单元区块对用户区块信息进行授权验证,用户区块对具体信息进行授权验证。
用户区块可向下延申,形成二级单元区块、二级用户区块,用户区块、二级单元区块和二级用户区块之间也构成锥体区块。
一种锥体区块链结构,包括若干个锥体区块,其中有一个锥体区块为总锥体区块,其它锥体区块按照所属类别或性质进行划分:
同一类别或性质的锥体区块位于同一列,且同一列上各锥体区块中的节点区块连接形成线形链;根据所属类别或性质的不同,形成若干列的线形链;不同列的线形链之间相交于总锥体区块中的节点区块,构成锥体区块链结构。
同一条列上的锥形区块按照等级分层并按照关联共识关系形成一个私有链,等级相同的锥形区块在同一层;不同列的线形链按照共识关系形成锥体联盟链。
按照按节点编码在锥体区块链结构中定位,生成各节点区块的创世区块;各节点区块分别生成分项单元区块编码,申请注册不同的分项单元区块;分项单元区块生成后,生成各用户区块编码,申请用户区块。
一种锥体区块链构建方法,节点区块的创世区块具体生成过程为:
S1、申请锥体区块链法人身份节点区块编码;
S2、管理机构对法人进行身份认证;
S3、法人身份认证通过后,注册法人节点区块服务网络地址、服务器标识;
S4、节点区块法人授权节点区块管理员,管理员身份认证通过;
S5、节点区块编码、服务网络地址、服务器标识、时间戳、管理员信息、区块内容生成节点创世区块。
分项单元区块和用户区块注册产生过程为:
S1、节点创世区块生成后,节点区块按节点编码在锥体区块链中定位;
S2、根据不同的业务性质申请注册不同分项单元区块,同时生成分项单元区块编码;
S3、授权分项单元区块管理员,管理员身份认证通过,申请分项单元内容;
S4、注册分项单元区块服务网络地址、服务器标识;
S5、分项单元区块编码、服务网络地址、服务器标识、时间戳、管理员信息、区块内容生成分项单元区块;
S6、分项单元区块生成后,可申请用户区块,同时生成用户区块编码;
S7、授权用户区块管理员,管理员身份认证通过,申请用户内容;
S8、注册用户区块服务网络地址、服务器标识;
S9、用户区块编码、服务网络地址、服务器标识、时间戳、管理员信息,区块内容、生成用户区块。
根据区块的关联关系可以把锥体区块链的锥体区块又分为主区块和次区块,其中内容管理主体区块为主区块,由关联共识存储内容形成的区块为次区块;由主区块的认证生成验证区块;关联验证区块为相关联区块验证内容的组合,生成关联验证区块。
用户区块内容主要由微区块组成,微区块内容由用户区块认证生成,为具体相关认证信息,微区块之间根据关联共识关系生成微区块链。
本发明与现有技术相比,具有的有益效果是:
锥体区块链结构包含节点区块,分项单元区块,用户区块,二级单元区块,微区块等。各个区块相互连接形成锥体网络结构,同时也是新型锥体网络数据分层存储方法,不同区块之间通过哈希值关联,各层级数据区块之间采用共识算法,确保信息的一致性,扩大了区块链的容量,解决了区块链耗能和区块链效率等问题,实现了多中心链式认证服务,解决了区块链去中心化模式存在的无监管问题。
附图说明
图1是本发明锥体区块的一种结构示意图;
图2是本发明锥体区块的另一种结构示意图;
图3是本发明锥体区块链的结构示意图;
图4是本发明锥体区块连接示意图;
图5是本发明区块生成流程示意图;
图6是本发明区块结构示意图;
图7是本发明用户区块与微区块之间关系的示意图;
图8是本发明验证区块与微区块之间关系的示意图;
图9是本发明锥体区块之间关系的一个实施例示意图;
图10是本发明节点区块的创世区块产生流程图;
具体实施方式
下面对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
如图1所示,一种锥体区块,包括节点区块、分项单元区块和用户区块,节点区块、分项单元区块和用户区块连接构成锥体区块;
节点区块为锥体区块的顶层区块;
分项单元区块为锥体区块的中层区块,属于节点区块的分类区块,是节点区块的子区块;
用户区块为锥体区块的底层区块。
如图6所示,锥体区块中的每个子区块是由区块头和区块体组成,其中区块头主要含有区块编码、关联区块哈希值、服务网络地址、服务器标识、时间戳、管理员信息哈希值、区块内容哈希值,区块体含有管理员信息,区块内容。
其中管理员信息包括,管理员的注册、更改、注销;区块内容包括验证内容、关联验证内容、其他区块内容。
如图2所示,用户区块根据自身服务内容,如提供公共平台的,可申请二级单元区块及二级用户区块;用户区块、二级单元区块和二级用户区块之间也构成锥体区块。有些机构也存在没有用户区块,或者没有分项单元区块的情况。
如图3所示,一种锥体区块链结构,包括若干锥体区块,其中有一个锥体区块为总锥体区块,其它锥体区块按照所属类别或性质进行划分:
优选的,同一类别或性质的锥体区块位于同一列,且同一列上各锥体区块中的节点区块连接形成线形链;根据所属类别或性质的不同,形成若干列的线形链;不同列的线形链之间相交于总锥体区块中的节点区块,整体构成锥体区块链结构。
具体按照何种类别或性质进行划分,可根据应用场景确定,例如:以国家为例,其中国家为总锥体区块,其它锥体区块按照部门性质进行划分:公安部、***、司法部等。
进一步,如图4所示,同一条列上的锥体区块按照等级分层并按照关联共识关系形成一个私有链;不同列的线形链按照共识关系形成锥体联盟链;等级相同的锥形区块在同一层,即同一条列上的同一层上包括一个以上等级相同的锥形区块。
私有链:同一性质的机构,位于锥体区块链的同一列,各个锥体区块按照共识关系形成私有链;联盟链:不同性质的机构,位于锥体区块链的不同列,各个锥体区块按照共识关系形成联盟链;具体的:可按照权属等级(或从属等级)分为不同的层级3-6。
例如:山西省公安,朔州市公安,平鲁区公安之间连接是私有链;山西省 公安,山西省民政局,山西省劳动局,等等之间连接是联盟链。
如图5和10所示,一种锥体区块链构建方法:
总体流程为:首先节点区块按照节点区块编码在锥体区块链结构中定位,生成各节点区块的创世区块;然后各节点区块分别生成分项单元区块编码,申请注册不同的分项单元区块;分项单元区块生成后,申请用户区块,进一步的,用户区块为法人用户是还可向下申请二级单元区块,二级用户区块等。
节点区块编码在锥体区块链中申请得到,用来定位节点区块在锥体区块链的位置,分项单元区块编码和用户区块编码层级关系嵌套包含节点区块编码,是分项单元区块和用户区块性质和功能的标识。
以国家为例:锥体区块链中节点区块和分项单元区块的编码由主权国家编码数字,国家权属分级形成的编码数字,管理性质划分形成的编码数字组成。
例如:中国总锥体区块编码为86,公安性质编码为A,民政性质编码为B,山西省公安86A03,朔州公安86A0303,平鲁公安86A030301,山西省民政86B03,朔州民政86B0303,平鲁民政86B030301等。
用户区块的编码是由用户区块存储的内容决定,区块体包含各种验证内容,关联验证内容。
如图10所示,节点区块的创世区块具体生成过程为:
S1、申请锥体区块链法人身份节点区块编码;
S2、管理机构对法人进行身份认证;
S3、法人身份认证通过后,注册法人节点区块服务网络地址、服务器标识;
S4、节点区块法人授权节点区块管理员,管理员身份认证通过;
S5、节点区块编码、服务网络地址、服务器标识、时间戳、管理员信息、区块内容生成节点创世区块。
例如:某省公安机关创建创世区块,首先要获得该省公安机关的节点区块编码,然后进行公安机关法人认证,法人身份认证通过后,注册公安机关节点区块服务网络地址和服务器标识,以及该公安机关授权管理员。该公安机关区块编码、服务网络地址、服务器标识、时间戳、管理员信息、区块内容生成该公安机关节点区块。
进一步的,分项单元区块和用户区块注册产生过程为:
S1、节点创世区块生成后,节点区块按节点编码在锥体区块链中定位;
S2、根据不同的业务性质申请注册不同分项单元区块,同时生成分项单元区块编码;
S3、授权分项单元区块管理员,管理员身份认证通过,申请分项单元内容;
S4、注册分项单元区块服务网络地址、服务器标识;
S5、分项单元区块编码、服务网络地址、服务器标识、时间戳、管理员信息、区块内容生成分项单元区块。
S6、分项单元区块生成后,可申请用户区块,同时生成用户区块编码;
S7、授权用户区块管理员,管理员身份认证通过,申请用户内容;
S8、注册用户区块服务网络地址、服务器标识;
S9、用户区块编码、服务网络地址、服务器标识、时间戳、管理员信息,区块内容、生成用户区块。
例如:该公安机关节点区块根据节点区块编码在锥体区块链中定位,根据公安机关内部部门职能的不同分别申请注册不同的分项单元区块,如刑侦、治安、户政、特业的分项单元区块,同时形成所对应的分项单元区块编码,该公安机关各部门授权分项单元区块管理员,以及注册分项单元区块服务网络地址、服务器标识;该公安机关各部门分项单元区块编码、服务网络地址、服务器标 识、时间戳、管理员信息、区块内容生成各部门对应的分项单元区块。公安机关各部门的用户区块是用户个体的具体信息。如户政科的用户区块记录某个人的姓名、出生日期、家庭关系等等。同理,用户区块编码、服务网络地址、服务器标识、时间戳、管理员信息,区块内容、生成该公安户政科的某个人的用户区块。
如图8所示,根据区块的关联关系可以把锥体区块链的锥体区块又分为主区块和次区块,其中内容管理主体区块为主区块,由同列上下级、同列同层、非列同层、不同列不同层等关联共识存储内容形成的区块为次区块;由主区块的认证生成验证区块;关联验证区块为相关联区块验证内容的组合,生成关联验证区块。
例如:某人的学历信息在***和某公司都需要存储。学历信息对于***相关区块而言是主区块,可以对学历信息修改,认证。但对某公司人事部的区块而言是次区块,无法对学历信息不可以进行修改,只做记录。
微区块与验证区块,关联验证区块的关系:
如图7所示,用户区块内容主要分为需要验证的内容和不需要验证的内容,需要验证的内容又分为验证内容和关联验证内容的分类,构成不同的微区块。微区块中属于本区块的信息验证,直接生成微区块,而有些信息需要从其他区块获取,则获取的只是其他区块的验证区块,这些区块构成本区块的微区块。
例如:具体某学生的学历信息在***存储,记录在学历相关部门(分项单元区块),生成该生学历信息的验证区块,当该生要进入一个机构或者企业工作需要提供学历信息,这个机构人事部(分项单元区块)需要记录认证该生的学历信息,该公司人事部(分项单元区块)获取学历部门验证区块的信息,具体信息记录在该公司关于该生用户区块的微区块中。而信息来源于***学历 部门(分项单元区块)产生的验证区块。该生用户区块微区块信息有些来自于关联验证区块,比如姓名和性别,形成的微区块,姓名信息来源于公安机构,而性别信息来源于医院相关科室,形成的微区块是公安和医院相关部门的关联验证区块产生。
如图6所示,节点区块为锥体区块的顶层区块,接收关联区块的哈希值,起到信息汇总的作用。其中区块头含有节点区块编码、同列同层节点区块哈希值、同列上下级节点区块哈希值、非列同层节点区块哈希值、服务网络地址、服务器标识、时间戳、管理员信息哈希值、验证内容哈希值、关联验证内容哈希值、其他区块内容哈希值、区块体含有管理员信息、验证内容、关联验证内容、其他区块内容。
同列同层指的是锥体区块位于锥体区块链的同一性质的列,地域层级相同;
同列上下级指的是锥体区块位于锥体区块链的同一性质的列,地域层级相邻;
非列同层指的是锥体区块位于锥体区块链的不同性质的列,地域层级相同;
如图9所示,同列同层:太原公安局,大同公安局;同列上下级:山西省公安厅,太原公安局;非列同层:大同公安局,太原民政局。
如图6所示,分项单元区块为锥体区块的中层区块,通过哈希值与其他区块连接,分项单元区块为部门专用区块,也是由区块头和区块体构成,其中区块头含有分项单元区块编码、同列同层分项单元区块哈希值、同列上下级分项单元区块哈希值、非列同层分项单元区块哈希值、服务网络地址、服务器标识、时间戳、管理员信息哈希值、验证内容哈希值、关联验证内容哈希值、其他区块内容哈希值、区块体含有管理员信息、验证内容、关联验证内容、其他区块内容。
如图6所示,用户区块在锥体区块的底层,是锥体区块链的底层区块,数量最多,用户区块是由区块头和区块体构成,其中区块头含有用户区块编码、其他关联区块哈希值、服务网络地址、服务器标识、时间戳、管理员信息哈希值、验证内容哈希值、关联验证内容哈希值,区块体含有管理员信息,验证内容,关联验证内容。
管理员信息主要包括管理员注册、更改、注销。区块都有管理员,管理员作用就是对整个区块信息进行管理。对信息进行认证、修改、记录。
锥体区块链信息认证存储为根据信息类别,信息所在区域,信息产生的时间段,按照不同的分配机制将不同的信息记录在不同机构分项单元区块中。该机构便是是本区域关于此类信息的权威部门,部门对该信息进行鉴定授权,如果信息正确便可以连同授权记录在锥体区块链。
以下为锥体区块链中可能发生的两个具体实例:
场景1:普通用户A与普通用户B进行结婚,普通用户A和普通用户B的身份认证信息存储在公安局(分项单元区块),通过公安机关相关部门(分项单元区块)可以对普通用户A、B身份信息进行相关验证,确定普通用户A和B的身份信息正确。同样在医院相关部门(分项单元区块)也能验证普通用户A和B之间没有不适合结婚的疾病。相当于婚检验证。当满足以上相关部门验证,普通用户A和B就可以去民政局相关部门(分项单元区块)进行结婚登记,具体结婚信息记录在民政局相关部门(分项单元区块)。如果要对普通用户A和B的结婚信息做验证,则需要对民政局相关部门分项单元区块产生的验证区块进行验证。
场景2:普通用户A在公司C工作,首先要对普通用户A和公司C的身份在公安局相关部门(分项单元区块)和工商相关部门(分项单元区块)通过验 证。证明身份信息正确,然后普通用户A要在公司C工作需要公司C的人事部(二级单元区块)对普通用户A的身份信息登记。记录在公司C人事部(二级单元区块)中,如果要验证普通用户A是否在公司C工作,则只需验证二级单元区块产生的验证区块。
上面仅对本发明的较佳实施例作了详细说明,但是本发明并不限于上述实施例,在本领域普通技术人员所具备的知识范围内,还可以在不脱离本发明宗旨的前提下作出各种变化,各种变化均应包含在本发明的保护范围之内。

Claims (10)

  1. 一种锥体区块,其特征在于:包括节点区块、分项单元区块和用户区块,节点区块、分项单元区块和用户区块连接构成锥体区块;
    节点区块为锥体区块的顶层区块;
    分项单元区块为锥体区块的中层区块,属于节点区块的分类区块,是节点区块的子区块;
    用户区块为锥体区块的底层区块。
  2. 根据权利要求1所述的一种锥体区块,其特征在于:节点区块、分项单元区块和用户区块均由区块头和区块体组成,其中区块头主要含有区块编码、关联区块哈希值、服务网络地址、服务器标识、时间戳、管理员信息哈希值和区块内容哈希值;区块体含有管理员信息和区块内容。
  3. 根据权利要求1所述的一种锥体区块,其特征在于:节点区块汇总分项单元区块的信息并进行相关授权验证;分项单元区块经节点区块申请生成,并分为不同类的分项单元区块;用户区块经分项单元区块申请生成,分项单元区块对用户区块信息进行授权验证,用户区块对具体信息进行授权验证。
  4. 根据权利要求1所述的一种锥体区块,其特征在于:用户区块可向下延申,形成二级单元区块、二级用户区块,用户区块、二级单元区块和二级用户区块之间也构成锥体区块。
  5. 一种锥体区块链结构,其特征在于:
    包括若干个如权利要求1至4中任一项所述的锥体区块,其中有一个锥体区块为总锥体区块,其它锥体区块按照所属类别或性质进行划分:
    同一类别或性质的锥体区块位于同一列,且同一列上各锥体区块中的节点区块连接形成线形链;根据所属类别或性质的不同,形成若干列的线形链;不同列的线形链之间相交于总锥体区块中的节点区块,构成锥体区块链结构。
  6. 根据权利要求5所述的一种锥体区块链结构,其特征在于:同一条列上的锥形区块按照等级分层并按照关联共识关系形成一个私有链,等级相同的锥形区块在同一层;不同列的线形链按照共识关系形成锥体联盟链。
  7. 根据权利要求5所述结构的一种锥体区块链构建方法,其特征在于:按照按节点编码在锥体区块链结构中定位,生成各节点区块的创世区块;各节点区块分别生成分项单元区块编码,申请注册不同的分项单元区块;分项单元区块生成后,生成各用户区块编码,申请用户区块。
  8. 根据权利要求7所述结构的一种锥体区块链构建方法,其特征在于:节点区块的创世区块具体生成过程为:
    S1、申请锥体区块链法人身份节点区块编码;
    S2、管理机构对法人进行身份认证;
    S3、法人身份认证通过后,注册法人节点区块服务网络地址、服务器标识;
    S4、节点区块法人授权节点区块管理员,管理员身份认证通过;
    S5、节点区块编码、服务网络地址、服务器标识、时间戳、管理员信息、区块内容生成节点创世区块。
  9. 根据权利要求7所述一种锥体区块链构建方法,其特征在于:分项单元区块和用户区块注册产生过程为:
    S1、节点创世区块生成后,节点区块按节点编码在锥体区块链中定位;
    S2、根据不同的业务性质申请注册不同分项单元区块,同时生成分项单元区块编码;
    S3、授权分项单元区块管理员,管理员身份认证通过,申请分项单元内容;
    S4、注册分项单元区块服务网络地址、服务器标识;
    S5、分项单元区块编码、服务网络地址、服务器标识、时间戳、管理员信 息、区块内容生成分项单元区块;
    S6、分项单元区块生成后,可申请用户区块,同时生成用户区块编码;
    S7、授权用户区块管理员,管理员身份认证通过,申请用户内容;
    S8、注册用户区块服务网络地址、服务器标识;
    S9、用户区块编码、服务网络地址、服务器标识、时间戳、管理员信息,区块内容、生成用户区块。
  10. 根据权利要求7所述一种锥体区块链构建方法,其特征在于:根据区块的关联关系可以把锥体区块链的锥体区块又分为主区块和次区块,其中内容管理主体区块为主区块,由关联共识存储内容形成的区块为次区块;由主区块的认证生成验证区块;关联验证区块为相关联区块验证内容的组合,生成关联验证区块。
PCT/CN2021/107673 2020-08-10 2021-07-21 一种锥体区块、锥体区块链结构和方法 WO2022033284A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010797084.1 2020-08-10
CN202010797084.1A CN112148787B (zh) 2020-08-10 2020-08-10 一种锥体区块、锥体区块链结构和方法

Publications (1)

Publication Number Publication Date
WO2022033284A1 true WO2022033284A1 (zh) 2022-02-17

Family

ID=73889119

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/107673 WO2022033284A1 (zh) 2020-08-10 2021-07-21 一种锥体区块、锥体区块链结构和方法

Country Status (2)

Country Link
CN (1) CN112148787B (zh)
WO (1) WO2022033284A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114185997A (zh) * 2022-02-17 2022-03-15 天津眧合数字科技有限公司 一种基于区块链的宠物信息可信存储***
CN116432239A (zh) * 2023-06-06 2023-07-14 杭州格物智安科技有限公司 一种基于区块链的个人信息服务***

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112148787B (zh) * 2020-08-10 2023-09-12 山西特信环宇信息技术有限公司 一种锥体区块、锥体区块链结构和方法
CN112801606A (zh) * 2020-12-31 2021-05-14 山西特信环宇信息技术有限公司 一种锥体区块链的电子合同***
CN112769917B (zh) * 2020-12-31 2022-08-02 山西特信环宇信息技术有限公司 一种锥体区块链的主权联盟链
CN112822687B (zh) * 2020-12-31 2023-03-24 山西特信环宇信息技术有限公司 一种锥体区块链移动终端认证方法
CN112907811A (zh) * 2021-01-29 2021-06-04 山西特信环宇信息技术有限公司 一种锥体区块链的选举***及投票方法
CN112989423A (zh) * 2021-04-15 2021-06-18 山西特信环宇信息技术有限公司 一种基于锥体区块链的权益分配***及方法
CN114153375B (zh) * 2021-08-13 2022-07-22 北京天德科技有限公司 一种基于区块链技术的块存储***及块存储方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897353A (zh) * 2016-12-29 2017-06-27 北京瑞卓喜投科技发展有限公司 中心型多维拓展的区块链的生成方法及***
CN109919756A (zh) * 2019-02-22 2019-06-21 西南财经大学 基于Merkle树回溯定位技术的转账***、查验方法及交易方法
CN109993656A (zh) * 2019-03-11 2019-07-09 杭州复杂美科技有限公司 树形区块链处理方法、设备和存储介质
US20200234383A1 (en) * 2019-04-29 2020-07-23 Alibaba Group Holding Limited Blockchain-based service source tracing method, apparatus, and electronic device
CN112148787A (zh) * 2020-08-10 2020-12-29 山西特信环宇信息技术有限公司 一种锥体区块、锥体区块链结构和方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897353A (zh) * 2016-12-29 2017-06-27 北京瑞卓喜投科技发展有限公司 中心型多维拓展的区块链的生成方法及***
CN109919756A (zh) * 2019-02-22 2019-06-21 西南财经大学 基于Merkle树回溯定位技术的转账***、查验方法及交易方法
CN109993656A (zh) * 2019-03-11 2019-07-09 杭州复杂美科技有限公司 树形区块链处理方法、设备和存储介质
US20200234383A1 (en) * 2019-04-29 2020-07-23 Alibaba Group Holding Limited Blockchain-based service source tracing method, apparatus, and electronic device
CN112148787A (zh) * 2020-08-10 2020-12-29 山西特信环宇信息技术有限公司 一种锥体区块、锥体区块链结构和方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114185997A (zh) * 2022-02-17 2022-03-15 天津眧合数字科技有限公司 一种基于区块链的宠物信息可信存储***
CN116432239A (zh) * 2023-06-06 2023-07-14 杭州格物智安科技有限公司 一种基于区块链的个人信息服务***
CN116432239B (zh) * 2023-06-06 2023-11-17 杭州格物智安科技有限公司 一种基于区块链的个人信息服务***

Also Published As

Publication number Publication date
CN112148787A (zh) 2020-12-29
CN112148787B (zh) 2023-09-12

Similar Documents

Publication Publication Date Title
WO2022033284A1 (zh) 一种锥体区块、锥体区块链结构和方法
Liu et al. Education-industry cooperative system based on blockchain
CN109766673A (zh) 一种联盟式音视频版权区块链***及音视频版权上链方法
WO2022063172A1 (zh) 一种锥体区块链管理方法及***
CN108804928A (zh) 一种溯源***中数据的安全可信任区块链及管理方法
CN113438084B (zh) 一种基于r-pbft共识算法和时间戳的绿电溯源方法及***
CN105975868A (zh) 一种基于区块链的证据保全方法及装置
CN109993647A (zh) 一种基于区块链的纳税征信***及处理方法
CN110728494B (zh) 不动产业务的办理方法、不动产权信息***及装置
CN110163607A (zh) 基于区块链智能合约的高校学生数字个人征信方法
CN111444267A (zh) 一种基于区块链的政府信息共享平台及方法
Liang et al. On the design of a blockchain-based student quality assessment system
CN111506590A (zh) 一种数字作品版权确权与交易可信记录管理方法
CN108334792B (zh) 一种金融业外援信息共享方法及装置
Liu Exploration & Research on Distance Education System Based on Blockchain Technology
Rachmat Design of distributed academic-record system based on blockchain
Dai et al. University student status management system based on blockchain
Sethia et al. Academic certificate validation using blockchain technology
Li et al. [Retracted] Optimization of University Archives Management under the Application of Blockchain Technology in the Digital Age
CN114037576A (zh) 学位资源的分配***及方法
CN112199729A (zh) 一种锥体区块链的验证方法及***
Azmi et al. Blockchain-based Data Sharing Framework for Malaysia Government Aid Management System
CN113660318A (zh) 一种基于区块链的学历、学位认证方法
She Research on file management based on block chain technology
Christine et al. A Study of Permissioned Blockchain-Based Framework for Land Ownership Tracking in Indonesia

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21855337

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21855337

Country of ref document: EP

Kind code of ref document: A1