Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Practical Byzantine fault-tolerant node setting method

A Byzantine and practical technology, applied in the field of communication, it can solve the problems of slow machine speed, waste of computing resources, robustness impact, etc., and achieve the effect of reducing the number of view changes, saving computing resources, and ensuring safe and reliable operation.

Active Publication Date: 2022-05-20
HENGBAO
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, due to environmental factors or the capabilities of the nodes themselves, the nodes do not often have problems, such as occlusion, fading, and electromagnetic interference in the wireless environment, electrophoresis, arcing in the wired environment, narrow bandwidth of the node, and slow machine speed. The above reasons All may cause the node to fail to complete the consensus process in time. In these cases, since deleting a node will change the view, and changing the view also requires a consensus operation, the deletion of the node obviously consumes the computing power of the current consensus system. If the node frequently has problems , then frequent deletion of nodes may consume a lot of computing power
Second, nodes that are disconnected and down are not identified and dealt with in a different way than nodes that are fraudulent or attacked. For example, some nodes that are disconnected or down are due to environmental factors or their own ability factors, and they cannot give feedback in a timely manner. In the case of consensus results, after the environmental factors of such nodes are normal or the processing speed is increased (for example, the machine has opened too many processes, some of the processes are closed after the speed slows down, and the speed returns to normal), at this time such nodes start from Byzantine nodes In this case, there is no need to delete such nodes. However, some fraudulent or attacking malicious nodes continuously release or feed back false consensus messages, which not only occupy and waste limited computing resources, but also Impact on the robustness of the consensus node set
For these two cases, the existing technology often adopts a one-size-fits-all approach, or it may be directly deleted by the node, or the node is deleted when the redundancy value or weight value of the node reaches a certain threshold, that is to say, the existing technology There is no distinction between two different types of nodes, malicious Byzantine nodes cannot be quickly deleted, and there is no fault-tolerant mechanism for non-malicious Byzantine nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Practical Byzantine fault-tolerant node setting method
  • Practical Byzantine fault-tolerant node setting method
  • Practical Byzantine fault-tolerant node setting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] The following steps are taken as an example, all of which occur after a consensus process is completed, assuming that there are a total of N consensus nodes as the set of consensus nodes for this view. The implementation process of this embodiment refers to the attached image 3 .

[0042] Step S102, receiving a consensus message sent by a consensus node, and extracting first consensus node information from the consensus message, where the first consensus node is a set of consensus nodes that send the consensus message.

[0043] Client C receives consensus messages sent by each consensus node. Among them, at least 2f+1 consensus nodes have replied to the client with a consistent consensus message, assuming that the number of consensus nodes reached is N0, and the remaining consensus nodes either did not reply to the message, or the reply message was consistent with that of N0 consensus nodes Replied messages are inconsistent. Client C extracts the information of the ...

Embodiment 2

[0063] In this embodiment, the relevant steps or functions implemented on the client C can be moved to the main consensus node P for processing.

[0064] Step S202, after the client receives the consensus message, it sends the consensus message to the main consensus node for processing

[0065] After each consensus node replies, the consensus result of the reply is collected and sent to the main consensus node, which should contain at least 2f+1 consistent consensus messages.

[0066] After the main consensus node P receives the consensus message from the client C, it extracts the consensus node information that sent the consensus message. The consensus node information can use information such as digital ID, machine name, IP address, MAC address, etc. The structure of the consensus information is , among them, the digital identification i of the consensus node is a regular parameter, and can also be replaced by other identification methods. In addition, r is the execution resu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a practical Byzantine fault-tolerant node setting method, wherein, the consensus message sent by the consensus node is received, and the information of the first consensus node is extracted from the consensus message, wherein the first consensus node is the one for sending the consensus message The set of consensus nodes; according to the received consensus message, extract the execution result of the consensus node, and according to the execution result, divide the first consensus node into the second type of Byzantine nodes and non-Byzantine nodes; extract The second consensus node information saved by the client, according to the first consensus node information and the second consensus node information, obtains the first type of Byzantine node; performs the first processing on the first type of Byzantine node, and performs the first processing on the second type The node does the second processing. The present invention distinguishes different types of Byzantine nodes, and adopts different processing strengths for different types of Byzantine nodes, can keep non-malicious Byzantine nodes as much as possible, reduces the number of view changes, saves online computing resources, and Try to eliminate malicious fraud or attacking Byzantine nodes to ensure the safe and reliable operation of the system.

Description

technical field [0001] The present invention relates to the field of communication technology or the field of computer technology, in particular to the improvement of the consensus process in the block chain, especially a practical Byzantine fault-tolerant node setting method. Background technique [0002] Consensus is the foundation of all blockchain technologies. Without consensus, the concept of blockchain decentralization cannot be formed. There are three deployment modes of blockchain: public chain, alliance chain, and private chain, corresponding to decentralized distribution system, partially decentralized distributed system, and weakly central distributed system. In a decentralized distributed system, we are faced with an unavoidable problem, that is, the consistency problem. When multiple hosts form a node set, the hosts need to perform state replication to reach a consistent state consensus. [0003] The commonly used mainstream consensus mainly includes Pow workl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/1008H04L67/1031H04L12/18H04L9/32
CPCH04L67/1008H04L67/1031H04L12/185H04L9/3247
Inventor 钱京崔可李婉
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products