CN112560081A - Cone block chain intelligent contract operation method and system - Google Patents
Cone block chain intelligent contract operation method and system Download PDFInfo
- Publication number
- CN112560081A CN112560081A CN202011253495.0A CN202011253495A CN112560081A CN 112560081 A CN112560081 A CN 112560081A CN 202011253495 A CN202011253495 A CN 202011253495A CN 112560081 A CN112560081 A CN 112560081A
- Authority
- CN
- China
- Prior art keywords
- block
- intelligent contract
- node
- cone
- blocks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012795 verification Methods 0.000 claims abstract description 29
- 230000007246 mechanism Effects 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 4
- 230000009471 action Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 230000008859 change Effects 0.000 description 4
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to the technical field of block chains, and particularly relates to a cone block chain intelligent contract operation method and system, which comprise the following steps: s1, cone block chain intelligent contract authentication consensus: in an intelligent contract running environment, authenticating an identity to-be-executed intelligent contract of a user participating in the to-be-executed intelligent contract; each block in the intelligent contract running environment authenticates the intelligent contract, and according to the consistent verification result of each block, the blocks achieve consensus on the intelligent contract and are connected through a hash value; s2, sending a cone block chain intelligent contract: sending the intelligent contract to be executed which passes the authentication and achieves the consensus to the cone block chain network; s3, cone block chain intelligent contract storage; and S4, executing the cone block chain intelligent contract. The security of the intelligent contract is ensured through the digital signature, the authentication mechanism and the consensus mechanism, and all blocks are intelligently stored according to the consensus relationship through calling the intelligent contract.
Description
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a cone block chain intelligent contract operation method and system.
Background
An intelligent contract is a set of codes and data, also called a "programmable contract", that is, a contract is defined by program coding, and execution conditions are preset, so that the contract can be automatically executed when certain conditions are triggered.
Two characteristics of the intelligent contract are:
1. the contract is highly autonomous and runs permanently, namely when a pre-programmed condition on the intelligent contract is triggered, the contract is automatically executed;
2. decentralization, transparent data and no falsification, namely, the participation of a centralization server is not needed, social resources can be saved, the transaction cost is reduced, and meanwhile, the trust problem can be solved.
The intelligent contracts are operated on the block chains, so that the whole process is transparent and can not be falsified, and meanwhile, the influence of a centralized mechanism can be avoided, so that the intelligent contracts can be operated efficiently.
The intelligent contracts of the blockchain seem to be very intelligent, but some vulnerabilities exist in the aspect of security performance, which may cause some serious transaction problems, such as hackers attacking an ether house by using the vulnerabilities of the intelligent contracts; and the multiple signature vulnerability of Party enables an attacker to invoke the contract function without authorization and transfer the assets in the contract to the own address.
The block chain intelligent contracts are also susceptible to interference of factors, such as transaction sequence dependence, and the intelligent contracts are different along with different transaction sequences, which is easy to be utilized by hackers and becomes an attack point; as another example, the time stamp depends, the execution of the intelligent contract depends on the time stamp in the block chain, the time stamp is different, the execution result of the intelligent contract is also different, and this can be utilized by the hacker.
Disclosure of Invention
Aiming at the technical problems, the invention provides a method and a system for operating a cone area block chain intelligent contract, which can solve the problems that the block chain intelligent contract in the prior art is lack of flexibility, low in safety performance and easy to attack.
In order to solve the technical problems, the invention adopts the technical scheme that:
an intelligent contract operation method for a cone block chain comprises the following steps:
s1, cone block chain intelligent contract authentication consensus:
in an intelligent contract running environment, authenticating an intelligent contract to be executed through each block in a cone block chain, achieving consensus on the intelligent contract by each block according to the verification result of the intelligent contract consistency of each block, and connecting the intelligent contracts through hash values of the blocks;
each block in the cone block chain is intelligently connected through the encoding hash value of the storage consensus block;
s2, sending a cone block chain intelligent contract:
sending the intelligent contract to be executed which passes the authentication and achieves the consensus to the cone block chain network;
s3, cone block chain intelligent contract storage:
storing the intelligent contract to be executed, the block consensus information and the block codes which pass the cone block chain authentication into a cone block chain network;
s4, executing the cone block chain intelligent contract:
when the intelligent contract to be executed is executed, the intelligent contract to be executed is read and loaded from the cone block chain by the intelligent contract running environment to be executed.
In said S1: after the cone block legal person authenticates, the node block legal person applies for registering node block codes, and locates the related series and the level of the block in the cone block chain through the codes;
according to the relations of adjacent levels in the same row, non-row same levels, same row same levels and relevant levels, the intelligent contract is used for achieving consistency consensus with the coded hash value of the upper level node block of the level where the row is located, the coded hash value of the lower level node block, the administrator hash value and the block content;
the method is agreed with block code hash values, manager hash values and block contents of nodes in the same row and layer;
the method is agreed with the block code hash value, the administrator hash value and the block content of the non-row same-layer node with the incidence relation;
the content generated by the node block through the authentication of the associated node block is agreed with the coded hash value, the administrator hash value and the block content of the associated node block;
the node blocks, the item division unit blocks, the secondary unit blocks, the user blocks, the micro blocks and the association blocks achieve consensus, and all the blocks are intelligently connected with each other through the intelligent contract.
The common storage of the adjacent levels of the same column of the node block comprises:
after the node creation block is generated, encoding hash values of adjacent superior node blocks in the same row are identified in common, broadcasting the node creation block to the superior node blocks by a standard broadcasting unit, wherein the broadcasting contents are the encoding hash value of the node block, the node administrator hash value, the block content and the timestamp, and meanwhile, broadcasting the node block encoding hash value to the inferior node blocks;
after the superior node block receives the broadcast, the node coding hash value in the broadcast unit is intelligently stored at the position of the head of the block of the node where the adjacent inferior coding hash value is stored according to a consensus mechanism, and the administrator hash value and the content are stored at the corresponding position of the adjacent level of the block and are used as the micro-block of the node;
the method comprises the following steps of non-row same layer, same row same layer, associated level common memory, item unit block common memory, secondary unit block common memory, user block common memory and micro block common memory, wherein corresponding common information is stored according to an adjacent level common memory method of the node block.
The intelligent contract content comprises: the algorithm code is used for processing the consensus of each block, the connection relation of the same column adjacent level, the non-column same level, the same column same level and the relevant level of each block, the hash value of each block, the block content, the administrator hash value, the administrator authority, the intelligent contract public key and the private key.
Digitally signing the information requiring verification through an intelligent contract private key, and sending digital signature information to a plurality of blocks achieving consensus; the public key of the intelligent contract allows the consensus-reached block to verify the message sent from the consensus intelligent contract and perform an action on the result of whether consensus was reached.
The verification content of the pyramidal zone-block chain comprises the following steps: verifying personal identity, legal identity, block content and contract content; the verification of the block content and the contract content is verified through a verification block hash value and a contract hash value; and the personal identity verification and the legal identity verification are used for authenticating the intelligent contract to be executed, and the authentication result is broadcast to the cone block chain network.
The consensus storage of the intelligent contracts comprises: and the node blocks, the item unit blocks, the secondary unit blocks and the user blocks are stored according to the relations of adjacent levels in the same column, non-column same layer, same column same layer and associated levels.
The cone block chain intelligent contract system comprises a cone block chain application terminal, an intelligent contract operating environment and a controller, wherein the controller is connected with the cone block chain application terminal and the intelligent contract operating environment; establishing an intelligent contract at a cone block chain terminal, and realizing authentication, consensus storage and intelligent connection of each block of the cone block chain through the intelligent contract; the controller includes a processor and a memory storing program instructions, the memory for storing a computer program, the computer program comprising: program code for performing pyramidal blockchain application terminal operations; the processor is configured to invoke an intelligent contract.
Compared with the prior art, the invention has the following beneficial effects:
the cone block chain block comprises a node block, a subentry unit block, a secondary unit block, a user block and a micro block, wherein individuals or legal persons registered in a cone block chain network authenticate intelligent contracts to be executed, the blocks in the cone block chain network achieve consensus through hash value comparison through verification results of the intelligent contracts and personal or legal person identity authentication passing results, and intelligent interconnection and intelligent storage can be achieved through the intelligent contracts. The security of the intelligent contract is ensured through a secret key technology, an authentication mechanism and a consensus mechanism, and the problems that the block chain intelligent contract in the prior art is lack of flexibility, low in security performance and easy to attack can be solved.
Drawings
FIG. 1 is a flow chart of a cone block chain intelligent contract system of the present invention;
FIG. 2 is a flow chart of cone block chain intelligent contract authentication consensus of the present invention;
FIG. 3 is a flow chart of cone block chain intelligent contract node block consensus storage of the present invention;
FIG. 4 is a block diagram of a pyramidal blockchain hierarchical structure according to the present invention;
FIG. 5 is a view of the cone block chain cone structure of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 to 3, a cone block chain intelligent contract system relates to blocks including: a node block, a subentry unit block, a secondary unit block, a user block and a micro-block. The blocks are stored according to the relations of adjacent blocks in the same row, same layer, non-row, same layer and relevant level, and the node blocks, the itemized unit blocks, the secondary unit blocks, the user blocks and the micro blocks are intelligently connected with each other through hash values by calling cone block chain intelligent contracts.
The concrete implementation steps of the cone block chain intelligent contract operation comprise:
and S1, a cone block chain intelligent contract authentication consensus step, namely authenticating the identity of a user or a legal person who participates in the intelligent contract to be executed in the intelligent contract running environment of the node block, the item unit block, the secondary unit block, the user block and the micro-block which construct the cone block chain.
The intelligent contracts are authenticated by each block in the intelligent contract running environment, the intelligent contracts are agreed by each block according to the consistent verification result of each block, and after the individual or legal person passes the authentication, the blocks are compared and agreed by the Hash value to form the agreed connection.
And S2, a cone block chain intelligent contract sending step, namely sending the intelligent contract to be executed which passes the authentication and reaches the consensus to the cone block chain network.
And S3, a cone zone block chain intelligent contract storage step, namely storing the intelligent contract to be executed, the block consensus information, the block hash value and the administrator hash value which pass the authentication of the cone zone block chain into the cone zone block chain network.
And S4, a cone block chain intelligent contract executing step, wherein when the intelligent contract to be executed is executed, the intelligent contract to be executed is read and loaded from the cone block chain by the intelligent contract operating environment for execution.
By calling the intelligent contract, the blocks are intelligently connected with each other and intelligently and commonly stored.
Further, in the above steps, the cone block chain intelligent contract authentication consensus step includes:
(1) after the cone block legal person authenticates, the node block legal person applies for registering node block codes, and locates the related series and the level of the block in the cone block chain through the codes;
(2) calling an intelligent contract according to the relation of the adjacent level in the same row, the non-row same level, the same row same level and the relevant level, and achieving consistency with the coded hash value, the administrator hash value and the block content of the lower-level block of the upper-level node block of the level where the row is located;
(3) the node block code hash value and the administrator hash value of the lower node block in the same row of the node block are consistent, and the node block code hash value and the administrator hash value of the same row of the lower node block are consistent;
(4) the code hash value of the non-row same layer code block is agreed with the code hash value of the non-row same layer node block with the same ownership relation;
(5) the node block achieves consensus through the content generated by the authentication of the associated node block, the coded hash value of the associated node block, the hash value of an administrator and the block content;
(6) the node blocks are intelligently connected with the item-dividing unit blocks, the secondary unit blocks, the user blocks, the micro blocks and the associated blocks through consensus by a consistency consensus algorithm. And the internal blocks of each block can also be connected with each other by the consensus intelligent contract, and the consensus intelligent contract is sent to the cone block chain network.
The intelligent contract content comprises an algorithm code for processing the consensus of each block, the connection relation of the same column adjacent level, the non-column same level, the same column same level and the relevant level of each block, the hash value of each block, the block content, the hash value of an administrator, the authority of the administrator, the intelligent contract public key and the private key. Wherein,
the smart contract private key digitally signs information for requesting verification and sends digitally signed messages to the plurality of consensus blocks, and the public key of the smart contract enables the consensus blocks to verify the messages sent from the consensus smart contract and whether the consensus result was achieved to perform an action.
The verification of the cone block chain comprises the verification of the personal identity, the legal identity, the block content and the contract content, wherein the verification of the block content and the contract content is verified through a verification block hash value and a contract hash value. And the personal identity verification and the legal identity verification are used for authenticating the intelligent contract to be executed, and the authentication result is broadcast to the cone block chain network.
Wherein the consensus storage of the intelligent contract comprises: the node blocks, the item unit blocks, the secondary unit blocks and the user blocks respectively call intelligent contracts according to the relations of the same-column adjacent levels, the non-column same layer, the same-column same layer and the relevant levels of the cone block chain hierarchical structure, so that intelligent storage is realized.
The consensus storage of the intelligent contract invoked by the same-column adjacent levels of the node block comprises the following steps:
(1) after the node creation block is generated, according to the common identification of the coding addresses of the adjacent upper node blocks in the same row, the node creation block starts broadcasting to the upper node blocks by a standard broadcasting unit, the broadcasting contents are the coding hash value, the node administrator hash value, the block contents and the timestamp of the node block, and the node block coding hash value is broadcasted to the lower node blocks.
(2) After the superior node block receives the broadcast, the node coding hash value in the broadcast unit is intelligently stored at the position of the head of the block of the node where the adjacent inferior coding hash value is stored according to a consensus mechanism, and the administrator hash value and the content are stored at the corresponding position of the adjacent level of the block and are used as the micro-block of the node.
(3) The node block changes are stored in corresponding positions according to the method, and a lower micro block chain is formed.
The common memory of the node blocks in different rows and same layers, the common memory of the associated levels, the common memory of the item-dividing unit blocks, the common memory of the secondary unit blocks, the common memory of the user blocks and the common memory of the micro blocks store corresponding common information according to an adjacent level common memory method of the node blocks.
The standard broadcast unit comprises a block coding hash value, a broadcast block manager hash value, broadcast content and a time stamp. The broadcast content includes: hash value change, broadcast tile content change, verification, and association verification.
The cone area block chain intelligent contract system further comprises a controller, and the controller is connected with the application end, the intelligent contract operation environment and the cone area block chain. And establishing an intelligent contract to be executed at the application end of the cone block chain, and authenticating, intelligently connecting and commonly storing the node block, the subentry unit block, the secondary unit block and the user block through an intelligent contract operating environment.
For example: the node creation block is a Shanxi province education hall, after the Shanxi province education hall is used as the creation block for registration and generation, the Shanxi province education hall calls an intelligent contract according to the coding address of the block of the upper national institute education department adjacent to the same row in the consensus, the Shanxi province education hall broadcasts the coding hash value, the manager hash value, the generated content and the timestamp of the Shanxi province education hall to the upper education department adjacent to the same row, and simultaneously the Shanxi province education hall broadcasts the coding hash value to the education bureaus in each city. After receiving the broadcast, the education department of the state department stores the encoded Hash value of the Shanxi province education hall in the adjacent lower level position of the block head of the node, the Hash value of the manager and the generated content are stored in the adjacent level position of the block and used as the micro-block of the education hall, if the information of the Shanxi province education hall is changed, the information is stored in the corresponding position according to the method, and a lower level (the Shanxi province education hall) micro-block chain is formed in the upper level node block (the education department).
The Shanxi province education hall as the node block will generate the office, such as: the method comprises the steps that hash values of block codes of units such as offices, policy and regulation departments, development planning departments, comprehensive reform departments and the like of the provincial and western education halls are authorized by law workers to generate hash values of managers of all departments, the managers of all the departments apply for generation of block contents, and broadcasting units of the departments to block code addresses corresponding to education departments. The adjacent superior department stores the item-coded hash value of the inferior department broadcasting unit in the adjacent level position of the block head, the administrator hash value and the content are stored in the adjacent level content position of the block body, and simultaneously broadcasts the block-coded hash value of each department unit to the adjacent level subordinate. Through an intelligent contract, each department unit block codes a hash value, an administrator hash value and content change are stored at corresponding positions according to the method, a lower micro block chain is formed, and the storage method of the same node is used for authentication storage and association verification storage.
After the creation block is generated, the creation block is intelligently connected with the item division unit block, the secondary unit block, the user block and the micro block through a consensus intelligent contract, wherein the item division unit block, the secondary unit block, the user block and the micro block can be intelligently connected with one another to form a cone linear chain. The node blocks, the item division unit blocks, the secondary unit blocks and the user blocks are connected in a consensus mode through the coded hash values of the blocks, the columns and the layers of the blocks are located through the coded hash values of the blocks, and intelligent connection of the blocks can be achieved according to the relations of adjacent levels in the same column, the same column and the same layer, non-column and the same layer and the relevant levels among the blocks.
For example: the Shanxi provincial education hall can be commonly identified with the department of State Council education (upper level in the same column), the Taiyuan City education office (lower level in the same column), the Shanxi provincial education office (same layer in the same column) and the Taiyuan civil government office (correlation level) through the coded hash value, so that intelligent connection is realized.
The following is a brief explanation of the structure of the pyramidal block chain.
As shown in fig. 4 and 5, the node patches are top-level patches of pyramid patches; the item-dividing unit block is a middle layer block of the cone block, belongs to a classification block of the node block and is a sub-block of the node block; the user tile is the bottom tile of the pyramid tile.
Each sub-block in the pyramid block is composed of a block head and a block body, wherein the block head mainly contains a block code, an associated block hash value, a service network address, a server identification, a time stamp, an administrator information hash value and a block content hash value, and the block body contains administrator information and block content. The administrator information comprises the registration, the change and the logout of an administrator; the block content comprises verification content, associated verification content and other block content.
The user block can apply for a secondary unit block and a secondary user block according to self service contents, such as providing a public platform; the user blocks, the secondary unit blocks and the secondary user blocks form pyramid blocks. There are also some organizations that have no user tiles, or no subentry tiles.
The cone block chain structure comprises a plurality of cone blocks, wherein one cone block is a total cone block, and other cone blocks are divided according to the categories or properties of the cone blocks: cone blocks of the same category or property are positioned in the same row, and node blocks in all the cone blocks on the same row are connected to form a linear chain; forming a plurality of rows of linear chains according to different categories or properties; and the linear chains in different rows intersect with the node blocks in the total cone block to form a cone block chain structure integrally.
Cone blocks in the same row are layered according to the levels and form a private chain according to the association consensus relationship; forming cone union chains by the linear chains in different columns according to a consensus relationship; tapered blocks of the same grade include more than one tapered block of the same grade on the same layer, i.e., the same layer in the same row.
The hierarchical relationship is from top to bottom: node block, item unit block, user block, secondary unit block, secondary user block, micro block.
The node blocks, the item dividing unit blocks and the user blocks respectively generate administrator and administrator hash values corresponding to the node blocks, the item dividing unit blocks and the user blocks, wherein the node block administrator hash values comprise hash values of lower item dividing unit block administrators, and the item dividing unit block administrator hash values comprise lower user block administrator hash values; information changes in each administrator may form hash values and broadcast over the cone blockchain.
Although only the preferred embodiments of the present invention have been described in detail, the present invention is not limited to the above embodiments, and various changes can be made without departing from the spirit of the present invention within the knowledge of those skilled in the art, and all changes are encompassed in the scope of the present invention.
Claims (8)
1. An intelligent contract operation method for a cone block chain is characterized by comprising the following steps: the method comprises the following steps:
s1, cone block chain intelligent contract authentication consensus:
in an intelligent contract running environment, authenticating an intelligent contract to be executed through each block in a cone block chain, achieving consensus on the intelligent contract by each block according to the verification result of the intelligent contract consistency of each block, and connecting the intelligent contracts through hash values of the blocks;
each block in the cone block chain is intelligently connected through the encoding hash value of the storage consensus block;
s2, sending a cone block chain intelligent contract:
sending the intelligent contract to be executed which passes the authentication and achieves the consensus to the cone block chain network;
s3, cone block chain intelligent contract storage:
storing the intelligent contract to be executed, the block consensus information and the block codes which pass the cone block chain authentication into a cone block chain network;
s4, executing the cone block chain intelligent contract:
when the intelligent contract to be executed is executed, the intelligent contract to be executed is read and loaded from the cone block chain by the intelligent contract running environment to be executed.
2. The method of claim 1, wherein the method comprises the steps of,
in said S1: after the cone block legal person authenticates, the node block legal person applies for registering node block codes, and locates the related series and the level of the block in the cone block chain through the codes;
according to the relations of adjacent levels in the same row, non-row same levels, same row same levels and relevant levels, the intelligent contract is used for achieving consistency consensus with the coded hash value of the upper level node block of the level where the row is located, the coded hash value of the lower level node block, the administrator hash value and the block content;
the method is agreed with block code hash values, manager hash values and block contents of nodes in the same row and layer;
the method is agreed with the block code hash value, the administrator hash value and the block content of the non-row same-layer node with the incidence relation;
the content generated by the node block through the authentication of the associated node block is agreed with the coded hash value, the administrator hash value and the block content of the associated node block;
the node blocks, the item division unit blocks, the secondary unit blocks, the user blocks, the micro blocks and the association blocks achieve consensus, and all the blocks are intelligently connected with each other through the intelligent contract.
3. The method of claim 2, wherein the consensus storage of the adjacent levels of the same column of the node blocks comprises:
after the node creation block is generated, encoding hash values of adjacent superior node blocks in the same row are identified in common, broadcasting the node creation block to the superior node blocks by a standard broadcasting unit, wherein the broadcasting contents are the encoding hash value of the node block, the node administrator hash value, the block content and the timestamp, and meanwhile, broadcasting the node block encoding hash value to the inferior node blocks;
after the superior node block receives the broadcast, the node coding hash value in the broadcast unit is intelligently stored at the position of the head of the block of the node where the adjacent inferior coding hash value is stored according to a consensus mechanism, and the administrator hash value and the content are stored at the corresponding position of the adjacent level of the block and are used as the micro-block of the node;
the method comprises the following steps of non-row same layer, same row same layer, associated level common memory, item unit block common memory, secondary unit block common memory, user block common memory and micro block common memory, wherein corresponding common information is stored according to an adjacent level common memory method of the node block.
4. The method for operating the cone block chain intelligent contract according to claim 1, wherein the intelligent contract contents comprise: the algorithm code is used for processing the consensus of each block, the connection relation of the same column adjacent level, the non-column same level, the same column same level and the relevant level of each block, the hash value of each block, the block content, the administrator hash value, the administrator authority, the intelligent contract public key and the private key.
5. The cone block chain intelligent contract running method according to claim 1 or 4, characterized in that, the information requesting verification is digitally signed by an intelligent contract private key, and a digital signature message is sent to a plurality of blocks achieving consensus; the public key of the intelligent contract allows the consensus-reached block to verify the message sent from the consensus intelligent contract and perform an action on the result of whether consensus was reached.
6. The method for operating the cone blockchain intelligent contract according to claim 1, wherein the verification content of the cone blockchain comprises: verifying personal identity, legal identity, block content and contract content; the verification of the block content and the contract content is verified through a verification block hash value and a contract hash value; and the personal identity verification and the legal identity verification are used for authenticating the intelligent contract to be executed, and the authentication result is broadcast to the cone block chain network.
7. The method for operating the cone block chain intelligent contracts according to claim 1, wherein the consensus storage of the intelligent contracts comprises: and the node blocks, the item unit blocks, the secondary unit blocks and the user blocks are stored according to the relations of adjacent levels in the same column, non-column same layer, same column same layer and associated levels.
8. The utility model provides a cone block chain intelligence contract system which characterized in that: the intelligent contract management system comprises a cone block chain application terminal, an intelligent contract operating environment and a controller, wherein the controller is connected with the cone block chain application terminal and the intelligent contract operating environment; establishing an intelligent contract at a cone block chain terminal, and realizing authentication, consensus storage and intelligent connection of each block of the cone block chain through the intelligent contract; the controller includes a processor and a memory storing program instructions, the memory for storing a computer program, the computer program comprising: program code for performing pyramidal blockchain application terminal operations; the processor is configured to invoke a smart contract to perform the method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011253495.0A CN112560081B (en) | 2020-11-11 | 2020-11-11 | Cone blockchain intelligent contract operation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011253495.0A CN112560081B (en) | 2020-11-11 | 2020-11-11 | Cone blockchain intelligent contract operation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112560081A true CN112560081A (en) | 2021-03-26 |
CN112560081B CN112560081B (en) | 2023-11-21 |
Family
ID=75041876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011253495.0A Active CN112560081B (en) | 2020-11-11 | 2020-11-11 | Cone blockchain intelligent contract operation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112560081B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107147735A (en) * | 2017-05-12 | 2017-09-08 | 北京博晨技术有限公司 | A kind of distributed account book system based on hierarchy |
CN108805562A (en) * | 2017-04-27 | 2018-11-13 | 中思博安科技(北京)有限公司 | The execution method and system of intelligent contract |
CN108846659A (en) * | 2018-06-13 | 2018-11-20 | 深圳前海微众银行股份有限公司 | Transfer account method, device and storage medium based on block chain |
CN108985936A (en) * | 2018-07-09 | 2018-12-11 | 北京中电普华信息技术有限公司 | A kind of auditing method and system based on intelligent contract |
-
2020
- 2020-11-11 CN CN202011253495.0A patent/CN112560081B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108805562A (en) * | 2017-04-27 | 2018-11-13 | 中思博安科技(北京)有限公司 | The execution method and system of intelligent contract |
CN107147735A (en) * | 2017-05-12 | 2017-09-08 | 北京博晨技术有限公司 | A kind of distributed account book system based on hierarchy |
CN108846659A (en) * | 2018-06-13 | 2018-11-20 | 深圳前海微众银行股份有限公司 | Transfer account method, device and storage medium based on block chain |
CN108985936A (en) * | 2018-07-09 | 2018-12-11 | 北京中电普华信息技术有限公司 | A kind of auditing method and system based on intelligent contract |
Also Published As
Publication number | Publication date |
---|---|
CN112560081B (en) | 2023-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11496310B2 (en) | Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication | |
CN109714174B (en) | Internet of things equipment digital identity management system and method based on block chain | |
CN112055025B (en) | Privacy data protection method based on block chain | |
Panda et al. | A blockchain based decentralized authentication framework for resource constrained iot devices | |
CN108270551B (en) | Security service construction system on block chain | |
CN111027036B (en) | Identity association method based on block chain | |
CN107948143A (en) | Identity-based privacy protection integrity detection method and system in cloud storage | |
CN108171068A (en) | A kind of student status certification alliance catenary system and its operation method | |
CN112217807A (en) | Cone block chain key generation method, authentication method and system | |
CN109376528A (en) | A kind of trusted identity management system and method based on block chain | |
US20190356496A1 (en) | Public Key Infrastructure & Method of Distribution | |
CN112149073B (en) | Cone blockchain management method and system | |
CN112667977A (en) | Smart city-oriented block chain identity authentication and access control method and system | |
CN102377573A (en) | Double-factor authentication method capable of securely updating password | |
CN112801606A (en) | Electronic contract system of cone block chain | |
CN110602083B (en) | Secure transmission and storage method of digital identity authentication data | |
Liu et al. | A blockchain-based cross-domain authentication management system for IoT devices | |
CN112769917B (en) | Owner power alliance chain of cone block chain | |
Jain et al. | AI and democracy's digital identity crisis | |
HanataniI et al. | A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication | |
CN110430207B (en) | Multi-point remote cross-network interaction collaborative authentication method for smart power grid | |
CN108173658A (en) | A kind of block chain consistency maintaining method and device | |
CN112560081A (en) | Cone block chain intelligent contract operation method and system | |
CN115567198A (en) | Internet of things identity authentication method based on alliance chain | |
CN113068188A (en) | External user identity authentication system based on wireless sensor node |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |