Authentication method and system, arbitration node, storage medium

A technology of arbitration nodes and verification methods, applied in the fields of storage media, verification methods and systems, and arbitration nodes, can solve problems such as monopoly of verification operations, false verification results issued by peripheral nodes, etc., and achieve the effect of improving accuracy and realizing randomness

Active Publication Date: 2018-12-14
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, it is easy to cause the verification operation to be monopolized by a certain number of nodes through the existing technology scheme, and it is easy to issue false verification results through these peripheral nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system, arbitration node, storage medium
  • Authentication method and system, arbitration node, storage medium
  • Authentication method and system, arbitration node, storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0062] see figure 1 , figure 1 A schematic flowchart of a verification method provided by an embodiment of the present invention.

[0063] like figure 1 As shown, the method includes:

[0064] S100: Acquire the arrival times at which the verification requests sent by the m nodes arrive at the n arbitration nodes in the preset ring connection relationship.

[0065] The ring connection relationship includes multiple arbitration nodes. When a new transaction needs to be verified, each node in the blockchain has the right to send a verification request to any one of the n arbitration nodes. That is to say, in this embodiment, each node has an equal chance of sending a verification request. Regardless of the accounting ability of a node, and regardless of whether a node is near a node with strong accounting ability, a node, like other nodes, can send a verification request to the arbitration node.

[0066] Such as: a total of 20 nodes. Among them, the first node A is a node w...

no. 2 example

[0081] This embodiment is based on the first embodiment.

[0082] figure 2 A schematic flowchart of determining a ring connection relationship provided by an embodiment of the present invention. combine figure 1 and figure 2 It can be seen that before S100, the method also includes:

[0083] S10: After each arbitration node of the mesh connection randomly generates a first random number, and each arbitration node broadcasts its corresponding first random number among all the arbitration nodes, according to each first random number Determine the location relationship of its corresponding arbitration node.

[0084] When there are 20 quorum nodes, upon initialization, a mesh connection of 20 quorum nodes is established.

[0085] The mesh connection refers to a direct connection relationship between any two arbitration nodes.

[0086] The first random number determines the predecessor and successor relationship between the 20 arbitration nodes. That is, the positional rel...

no. 3 example

[0093] This embodiment is based on the second embodiment.

[0094] image 3 A schematic flowchart of determining a ring connection relationship provided by another embodiment of the present invention.

[0095] combine figure 1 , figure 2 and image 3 It can be seen that after S20, the method further includes:

[0096] S30: After each arbitration node randomly generates the second random number, perform countdown processing according to the second random number corresponding to the first arbitration node.

[0097] S40: When the countdown ends, broadcast the reordering message to the arbitration nodes other than the first arbitration node, so that the arbitration nodes other than the first arbitration node can sort according to the reordering message to obtain a new ring connection relation.

[0098] Among them, the n arbitration nodes include the first arbitration node.

[0099] The second random number determines when to initiate the change of the ring connection relat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to an authentication method and a system, an arbitration node and a storage medium, belonging to the technical field of block chains. The method comprises the following steps: obtaining the arrival time of an authentication request from m nodes to n arbitration nodes in a preset ring connection relationship; randomly selecting y nodes from m nodes as verification nodes according to each arrival time; verifying the transaction by the verifying node, wherein one node corresponds to one arbitration node and corresponds to one arrival time, and 0 <y <m, 0 <n. Provided by the present embodiment is a technical scheme that: y nodes are randomly selected from m nodes as verification nodes according to the arrival time, and the transaction is verified by theverification node, which avoids the technical drawback that the verification operation is monopolized by a certain number of nodes in the prior art, which causes the peripheral nodes to publish falseverification results, thereby realizing the technical effect of improving the accuracy of the verification results.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of blockchain, and in particular, to a verification method and system, an arbitration node, and a storage medium. Background technique [0002] With the improvement of computing power of computers and the wide application of blockchain technology. Records of transactions that are progressively adopted blockchain technology. [0003] In the prior art, the accounting method is based on the workload proof, that is, the node with strong computing power will preferentially obtain the accounting right. Current blockchain transactions are verified using a majority consensus method. That is, when the number of nodes verifying the transaction reaches a certain number, the transaction is considered valid. [0004] In the process of realizing the present invention, the inventor found at least the following problems: [0005] At present, the commonly used practice in practice is that the neighb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06Q40/04
CPCG06Q40/04H04L63/08H04L63/205H04L67/10H04L2463/102
Inventor 张伦泳
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products