Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Practical Byzantine fault-tolerant node setting method

A Byzantine, practical technology used in the field of communications to solve problems such as fading, occlusion, and wasted computing resources

Active Publication Date: 2020-09-04
HENGBAO
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, due to environmental factors or the capabilities of the nodes themselves, the nodes do not often have problems, such as occlusion, fading, and electromagnetic interference in the wireless environment, electrophoresis, arcing in the wired environment, narrow bandwidth of the node, and slow machine speed. The above reasons All may cause the node to fail to complete the consensus process in time. In these cases, since deleting a node will change the view, and changing the view also requires a consensus operation, the deletion of the node obviously consumes the computing power of the current consensus system. If the node frequently has problems , then frequent deletion of nodes may consume a lot of computing power
Second, nodes that are disconnected and down are not identified and dealt with in a different way than nodes that are fraudulent or attacked. For example, some nodes that are disconnected or down are due to environmental factors or their own ability factors, and they cannot give feedback in a timely manner. In the case of consensus results, after the environmental factors of such nodes are normal or the processing speed is increased (for example, the machine has opened too many processes, some of the processes are closed after the speed slows down, and the speed returns to normal), at this time such nodes start from Byzantine nodes In this case, there is no need to delete such nodes. However, some fraudulent or attacking malicious nodes continuously release or feed back false consensus messages, which not only occupy and waste limited computing resources, but also Impact on the robustness of the consensus node set
For these two cases, the existing technology often adopts a one-size-fits-all approach, or it may be directly deleted by the node, or the node is deleted when the redundancy value or weight value of the node reaches a certain threshold, that is to say, the existing technology There is no distinction between two different types of nodes, malicious Byzantine nodes cannot be quickly deleted, and there is no fault-tolerant mechanism for non-malicious Byzantine nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Practical Byzantine fault-tolerant node setting method
  • Practical Byzantine fault-tolerant node setting method
  • Practical Byzantine fault-tolerant node setting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] The following steps are taken as examples, all of which occur after a consensus process is completed, assuming that there are a total of N consensus nodes as the consensus node set for this view. The implementation process of this embodiment refers to the attached image 3 .

[0042] Step S102, receiving the consensus message sent by the consensus node, and extracting the information of the first consensus node from the consensus message, the first consensus node is a set of consensus nodes sending the consensus message.

[0043] Client C receives consensus messages sent by each consensus node. Among them, at least 2f+1 consensus nodes have replied to the client with a consistent consensus message, assuming that the number of consensus nodes reached is N0, and the remaining consensus nodes either did not reply to the message, or the reply message was consistent with that of N0 consensus nodes Replied messages are inconsistent. Client C extracts the information of the...

Embodiment 2

[0063] In this embodiment, the relevant steps or functions implemented on the client C can be moved to the main consensus node P for processing.

[0064] Step S202, after the client receives the consensus message, it sends the consensus message to the main consensus node for processing

[0065] After each consensus node replies, the consensus result of the reply is collected and sent to the main consensus node, which should contain at least 2f+1 consistent consensus messages.

[0066] After the main consensus node P receives the consensus message from the client C, it extracts the consensus node information that sent the consensus message. The consensus node information can use information such as digital identification, machine name, IP address, MAC address, etc. The structure of the consensus information is , among them, the digital identification i of the consensus node is a regular parameter, and can also be replaced by other identification methods. In addition, r is the ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a practical Byzantine fault-tolerant node setting method which comprises the following steps: receiving a consensus message sent by a consensus node, and extracting informationof a first consensus node from the consensus message, the first consensus node being a consensus node set for sending the consensus message; extracting an execution result of the consensus node according to the received consensus message, and dividing the first consensus node into a second type of Byzantine node and a non-Byzantine node according to the execution result; extracting second consensus node information stored by the client, and obtaining a first type of Byzantine node according to the first consensus node information and the second consensus node information; and performing firstprocessing on the first type of Byzantine node, and performing second processing on the second type of Byzantine node. According to the invention, different types of Byzantine nodes are distinguished,and different processing forces are adopted for different types of Byzantine nodes, so that non-malicious Byzantine nodes can be reserved as much as possible, the view change frequency is reduced, online computing resources are saved, malicious fraudulent or attacked Byzantine nodes are eliminated as much as possible, and safe and reliable operation of the system is ensured.

Description

technical field [0001] The present invention relates to the field of communication technology or computer technology, in particular to the improvement of the consensus process in the block chain, especially a practical Byzantine fault-tolerant node setting method. Background technique [0002] Consensus is the foundation of all blockchain technologies. Without consensus, the concept of blockchain decentralization cannot be formed. There are three deployment modes of blockchain: public chain, alliance chain, and private chain, corresponding to decentralized distribution system, partially decentralized distributed system, and weakly central distributed system. In a decentralized distributed system, we are faced with an unavoidable problem, that is, the consistency problem. When multiple hosts form a node set, the hosts need to perform state replication to reach a consistent state consensus. [0003] The commonly used mainstream consensus mainly includes Pow workload proof, Po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/18H04L9/32
CPCH04L67/1008H04L67/1031H04L12/185H04L9/3247
Inventor 钱京崔可李婉
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products