A block chain-based decentralized chip R & D transaction data storage method and system
A transaction data, decentralized technology, applied in the computer field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] Such as figure 1As shown, a decentralized chip research and development transaction data storage method provided in Embodiment 1 may include the following steps:
[0043] Step 101: Obtain the transaction data, smart contract message data, and chip research and development data generated by each chip research and development transaction within a preset period of time.
[0044] Step 102: Utilize at least two consensus nodes to perform at least one hash operation on the block header sequentially, wherein each hash operation obtains a hash value, and the block header is based on all transaction data and all smart contract message data.
[0045] Step 103: Determine the target consensus node as an accounting node, wherein the target consensus node preferentially calculates a hash value that is less than the preset autonomous mining target value.
[0046] Step 104: Through the bookkeeping node, store all chip research and development data generated within the preset time per...
Embodiment 2
[0055] Embodiment 2 is basically the same as Embodiment 1, and the similarities will not be repeated. The difference is that: before using at least two consensus nodes to perform at least one hash operation on the block header sequentially, it further includes: from at least two The at least two consensus nodes are selected from system nodes and at least one authorization node, wherein the system node is a node that is always online and operates stably, and the authorization node is a practitioner user node with consensus authority.
[0056] In detail, the system node can be a node in the peer-to-peer network that can always run stably online, and belongs to the node deployed to ensure normal data storage at any time, so the system node usually does not have a corresponding employer or individual practitioner. Correspondingly, the authorized node is a practitioner user node with consensus authority in the peer-to-peer network, that is, the authorized node corresponds to a pract...
Embodiment 3
[0062] Embodiment 3 is basically the same as Embodiment 2, and the similarities will not be repeated. The difference is that: selecting the at least two consensus nodes from at least two system nodes and at least one authorization node includes: selecting from at least two system nodes and at least one authorization node. At least one target authorization node is selected from an authorization node, wherein the probability of any authorization node being selected as the target authorization node is proportional to the participation degree corresponding to the authorization node, and the participation degree is determined by the online time of the authorization node and / or determining by evaluating scores; determining the at least two system nodes and the at least one target authorization node as the at least two consensus nodes.
[0063] It should be noted that the target authorized nodes selected from the authorized nodes are all online, and the offline authorized nodes will n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



