Practical Byzantine fault-tolerant node setting method
A Byzantine, practical technology used in the field of communications to solve problems such as fading, occlusion, and wasted computing resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] The following steps are taken as examples, all of which occur after a consensus process is completed, assuming that there are a total of N consensus nodes as the consensus node set for this view. The implementation process of this embodiment refers to the attached image 3 .
[0042] Step S102, receiving the consensus message sent by the consensus node, and extracting the information of the first consensus node from the consensus message, the first consensus node is a set of consensus nodes sending the consensus message.
[0043] Client C receives consensus messages sent by each consensus node. Among them, at least 2f+1 consensus nodes have replied to the client with a consistent consensus message, assuming that the number of consensus nodes reached is N0, and the remaining consensus nodes either did not reply to the message, or the reply message was consistent with that of N0 consensus nodes Replied messages are inconsistent. Client C extracts the information of the...
Embodiment 2
[0063] In this embodiment, the relevant steps or functions implemented on the client C can be moved to the main consensus node P for processing.
[0064] Step S202, after the client receives the consensus message, it sends the consensus message to the main consensus node for processing
[0065] After each consensus node replies, the consensus result of the reply is collected and sent to the main consensus node, which should contain at least 2f+1 consistent consensus messages.
[0066] After the main consensus node P receives the consensus message from the client C, it extracts the consensus node information that sent the consensus message. The consensus node information can use information such as digital identification, machine name, IP address, MAC address, etc. The structure of the consensus information is , among them, the digital identification i of the consensus node is a regular parameter, and can also be replaced by other identification methods. In addition, r is the ex...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com