Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain consensus method and system

A blockchain and consensus technology, applied in the blockchain field, can solve problems such as failure, achieve low transaction delay, save computing resources, and improve the effect of low security margins

Active Publication Date: 2020-09-01
山东三宏信息科技有限公司
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it uses a common Byzantine fault-tolerant algorithm, and its natural characteristics lead to its security boundary being no more than 1 / 3 of malicious nodes, which is much lower than 1 / 2 of the PoW algorithm
There is still a risk of failure when the number of malicious nodes is large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain consensus method and system
  • Blockchain consensus method and system
  • Blockchain consensus method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] First, when any participating node submits a request information, the information is transmitted to the blockchain network, and a new block is generated. The new block contains the request information and digital agreement, and the request information contains specific transaction content, such as A pays a certain currency to B. The corresponding digital agreement includes the operations that participants in the trader should perform after the transaction is authenticated, such as confirming that A pays B, and B provides A with corresponding goods or gives corresponding feedback. The request information is broadcast in the private chain, and the verification node verifies the request information, and verifies whether the digital signature sending the request information comes from a legal participating node. Then verify the legitimacy of the requested operation. If the verification node cannot reach a consensus based on the Byzantine fault-tolerant algorithm, the reque...

Embodiment 2

[0028]First, use the same procedure as in Example 1 to initiate a transaction. If the private chain verification nodes based on the Byzantine fault-tolerant algorithm reach a consensus, the requested information will pass the preliminary verification. At this time, the security boundary of the verification result is that no more than 33% of the nodes are attacked or If there is malicious collusion, the verification result is reliable. If there are N malicious nodes in the network, the reliability of the results can only be guaranteed when the total number of nodes is greater than or equal to 3N+1. In order to improve the security and reliability of the network, after the request information passes the preliminary verification, it is submitted to the public chain, and the secondary verification nodes are selected in different private chains based on random algorithms to form a random block network to perform secondary verification of the request information . During the second...

Embodiment 3

[0030] First, use the same procedure as in Example 1 to initiate a transaction. If the private chain verification nodes based on the Byzantine fault-tolerant algorithm reach a consensus, the requested information will pass the preliminary verification. At this time, the security boundary of the verification result is that no more than 33% of the nodes are attacked or If there is malicious collusion, the verification result is reliable. If there are N malicious nodes in the network, the reliability of the results can only be guaranteed when the total number of nodes is greater than or equal to 3N+1. In order to improve the security and reliability of the network, after the request information passes the preliminary verification, it is submitted to the public chain, and the secondary verification nodes are selected in different private chains based on random algorithms to form a random block network to perform secondary verification of the request information . If a consensus i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a blockchain consensus method and system. The method comprises the steps: achieving a consensus mechanism by adopting a dual Byzantine fault-tolerant algorithm; enabling any node participating in the blockchain to have right to create a piece of request information; submitting a corresponding digital protocol; broadcasting the request information to a private chain where the request information is located, wherein a verification node in the private chain verifies the request information based on a Byzantine fault-tolerant algorithm; after consensus is reached, submitting the request information to a public chain, then randomly selecting corresponding participation nodes from different private chains based on a random algorithm to serve as second-layer verificationnodes to form a random block network, performing secondary verification on the request information, and if the secondary verification is based on a Byzantine fault-tolerant algorithm to reach the consensus, determining that the request is authenticated, wherein if any verification cannot reach the consensus, the request is rejected, and the request information and the digital protocol are cleared.By the adoption of the consensus algorithm, the defects that a PoW algorithm is large in calculated amount and low in processing speed are overcome, and the defect that a common Byzantine fault-tolerant algorithm is low in safety boundary is also overcome.

Description

technical field [0001] This application relates to the technical field of blockchain, and specifically relates to a blockchain consensus method and system. Background technique [0002] The blockchain technology originated from Bitcoin is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Features such as traceability, collective maintenance, openness and transparency, etc., its rich application scenarios are mainly based on the fact that the blockchain can solve the problem of information asymmetry and realize collaborative trust and concerted action among multiple subjects. Therefore, the consensus mechanism is the core of blockchain technology. Bitcoin adopts the PoW (Proof of work) consensus algorithm. Each node participating in the network performs workload calculations, and broadcasts and receives information on the entire network. When the consensus is reached, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06H04L29/08G06F21/64G06Q20/38
CPCH04L9/3247H04L63/0876H04L67/1097G06Q20/3827G06F21/64Y02D10/00
Inventor 张妍
Owner 山东三宏信息科技有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More